{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "olm.targetNamespaces": "",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported",
                    "operators.coreos.com/openshift-cert-manager-operator.cert-manager-operator": ""
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "cert-manager-operator",
                "resourceVersion": "17371",
                "uid": "43b6170b-87f3-4244-beb2-0fb121df2bb5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:51Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "cert-manager-operator",
                "resourceVersion": "19193",
                "uid": "63f1d2a8-1e27-4790-bc45-605f87796736"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "cert-manager-operator",
                "resourceVersion": "19646",
                "uid": "b89aae05-62fb-40dd-a9a3-e6c16e0a5b1f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "cert-manager-operator",
                "resourceVersion": "29175",
                "uid": "c0231ae2-bc13-4594-8afb-d38a76b66ba2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:53Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "cert-manager",
                "resourceVersion": "17699",
                "uid": "87050ce8-c667-4e68-9169-571ba46dbbd9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:54Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "cert-manager",
                "resourceVersion": "19443",
                "uid": "bf75a015-9efe-455d-ac69-af8de844f866"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "cert-manager",
                "resourceVersion": "19989",
                "uid": "d03e808c-2d4f-4c06-8d8f-855691cfabb8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:01Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "cert-manager",
                "resourceVersion": "29135",
                "uid": "af3e0cc9-aa32-4208-82f6-584a1e719c79"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "dedicated-admin",
                "resourceVersion": "17502",
                "uid": "13188d2a-aa99-4965-8dc0-8ad0628d8abc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "dedicated-admin",
                "resourceVersion": "19379",
                "uid": "1c8c0add-52e6-4bae-98a9-a024e0304411"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:12Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "dedicated-admin",
                "resourceVersion": "19922",
                "uid": "107f9cd6-edc4-4e41-819f-f8be198a5c3c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "dedicated-admin",
                "resourceVersion": "29103",
                "uid": "8d0e6f17-2916-4c61-a923-b7960eb6de10"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "default",
                "resourceVersion": "17529",
                "uid": "7c33d238-f7c7-4d04-ac28-68c6a7d61bc0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "default",
                "resourceVersion": "19396",
                "uid": "ad55bd47-257c-4e27-a1df-3a01e871cb2a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "default",
                "resourceVersion": "19940",
                "uid": "e5c4ec75-2511-4340-9d1f-33f1bc5876fb"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "default",
                "resourceVersion": "29112",
                "uid": "8c254a9e-e16b-4bb0-b749-2c1ef3285f4e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "konflux-operator",
                "resourceVersion": "17297",
                "uid": "f4e41c38-dcc6-445e-b56f-1ec69f0dbd04"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "olm.targetNamespaces": "",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:45Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operators.coreos.com/konflux-operator.konflux-operator": ""
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "konflux-operator",
                "resourceVersion": "18942",
                "uid": "b691d555-f886-4ee5-8266-d5b0445c34ff"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "konflux-operator",
                "resourceVersion": "19781",
                "uid": "1a4a04d5-eefb-4a99-801f-50d0e5856d3e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "konflux-operator",
                "resourceVersion": "29181",
                "uid": "3a9c62e1-9471-47e4-a914-1736ffadeef0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:44Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "konflux-ui",
                "resourceVersion": "17291",
                "uid": "3be3b24f-21e6-4598-856e-7a13341ff039"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:51Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "konflux-ui",
                "resourceVersion": "19244",
                "uid": "914f4a58-18f3-4edb-87fd-965da6b1ad3b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "konflux-ui",
                "resourceVersion": "19763",
                "uid": "dda07cd2-0fe0-4036-bccb-cd10961c3138"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "konflux-ui",
                "resourceVersion": "29180",
                "uid": "b8ba271f-6483-4632-85ec-6e56b25b80b2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "kube-node-lease",
                "resourceVersion": "17364",
                "uid": "b8060bbb-2197-428a-88d7-3d057babc2e7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:53Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "kube-node-lease",
                "resourceVersion": "19328",
                "uid": "c55a7f9b-fb8c-4944-a5a3-df8d52387faf"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "kube-node-lease",
                "resourceVersion": "19874",
                "uid": "a2ec6b63-e612-4c52-9b06-62c3955ff3ee"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "kube-node-lease",
                "resourceVersion": "29196",
                "uid": "6d726848-de26-4df1-a2ff-497c6c3e2b3f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "kube-public",
                "resourceVersion": "17505",
                "uid": "4a91adde-8b1a-4b44-a472-bc027924214a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "kube-public",
                "resourceVersion": "19381",
                "uid": "0ede6623-a446-44a3-86cd-5be219e5d306"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:12Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "kube-public",
                "resourceVersion": "19924",
                "uid": "4914cb30-109a-4c7d-80a2-e72300c0d59d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "kube-public",
                "resourceVersion": "29104",
                "uid": "1daa2a86-c784-4874-be29-fa1d929d8981"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "kube-system",
                "resourceVersion": "17074",
                "uid": "8fd6f028-be49-4030-a5d8-ce1ef147e989"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:48Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "kube-system",
                "resourceVersion": "18947",
                "uid": "6c9a7b45-b3c3-4749-966d-7a6c955b59b9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "kube-system",
                "resourceVersion": "20005",
                "uid": "ef9e35c8-300d-42e3-ae19-07481e3fc045"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:01Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "kube-system",
                "resourceVersion": "29150",
                "uid": "e71119f9-5e09-4a1c-8428-4b386fd0b7a9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "open-cluster-management-2peb3vkdph24mruvov1fesssleh67mln",
                "resourceVersion": "17519",
                "uid": "c30d3d50-2bc5-4b51-9fff-01cefae41f4c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "open-cluster-management-2peb3vkdph24mruvov1fesssleh67mln",
                "resourceVersion": "19391",
                "uid": "6a8d24cf-c54d-4cce-b070-3225447cf592"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "open-cluster-management-2peb3vkdph24mruvov1fesssleh67mln",
                "resourceVersion": "19933",
                "uid": "3faa2623-7a09-4689-8eb3-7f590d6fc214"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "open-cluster-management-2peb3vkdph24mruvov1fesssleh67mln",
                "resourceVersion": "29109",
                "uid": "d0f009b0-35a2-4372-a2cf-a366d02bb612"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "17494",
                "uid": "302a06de-768e-47de-bb32-fb4a41548cbf"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "19377",
                "uid": "50bd601b-ca86-43f3-8022-27ec7961cb7a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:12Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "19920",
                "uid": "ab481231-59e4-40fc-84af-4a31aa3c3ca3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "29101",
                "uid": "61f1a321-2a05-4696-8f69-3e74bb0839bc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "17182",
                "uid": "f61de862-17aa-4870-a706-c3fb29351644"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:50Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "19113",
                "uid": "8149ef22-f61d-4560-afcf-c40ea9b397c4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "19566",
                "uid": "288361cc-d7db-4d36-b4e5-b11ff94b0688"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "29167",
                "uid": "729521d3-1866-41e4-8fc6-802e21b5d79c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "17533",
                "uid": "c86a2613-da33-42c8-b8d3-3830e8716979"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-apiserver",
                "resourceVersion": "19398",
                "uid": "198dfcf5-ac0d-4f11-95c7-1ca97471edce"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-apiserver",
                "resourceVersion": "19943",
                "uid": "e0dd63c2-078b-4e64-ac07-aeb283afaa3a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-apiserver",
                "resourceVersion": "29113",
                "uid": "a4b62660-f3b6-46fe-983c-1582899b4108"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "17135",
                "uid": "4b196658-a15e-4a1d-94c7-78508ca81161"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "19003",
                "uid": "2cd5124a-4674-4722-945e-52b470453b1e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "20023",
                "uid": "af12f93a-cea9-4579-9d65-d6483da613bb"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "29160",
                "uid": "a1e062c3-8525-4dc6-8623-52190dcfce44"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-authentication",
                "resourceVersion": "16978",
                "uid": "9a413fee-b47a-4c93-9a03-d8a2e30642e5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:48Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-authentication",
                "resourceVersion": "19450",
                "uid": "911f4472-00d5-4609-b7d7-7a2d89b35952"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-authentication",
                "resourceVersion": "19997",
                "uid": "62ad80e0-5ea5-4698-9736-b07e21e6b0cc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:01Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-authentication",
                "resourceVersion": "29139",
                "uid": "3664c506-3dbf-4167-9f95-4d320e605f7f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "17119",
                "uid": "adb051ae-9fc7-46a2-a8da-b1da235aae7d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "18972",
                "uid": "9133802c-a833-4e95-ab49-cba26ad19645"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "20017",
                "uid": "0299344e-9368-467e-ba0b-c7ae0ac940f6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "29157",
                "uid": "b8568eb8-bd59-4269-9de9-b8679e4969b7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "17112",
                "uid": "14191fd2-571d-4e13-a20f-3845846c001f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "18967",
                "uid": "2c0341ab-8024-4633-a9d7-cea751b7be72"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "20015",
                "uid": "2e452042-a273-492b-a573-449f9b845589"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "29156",
                "uid": "05ed330a-a3ee-419b-965f-7c1ac351d4b3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "16954",
                "uid": "78d37f2c-5725-4ed1-a9d8-a925a157b430"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "19438",
                "uid": "48f24721-0931-49e1-a03f-999dc1ddf698"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "19985",
                "uid": "10a6ab4e-f4bd-435a-9225-909fc9c7a9f0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:01Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "29133",
                "uid": "69027eaf-79ba-4e4f-8ac1-f819f403bd12"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "17267",
                "uid": "66264ece-9f70-4f14-8e22-bdb357251c59"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:51Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "19216",
                "uid": "f93c86bc-886c-47ae-8002-d4d257669aa0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "19674",
                "uid": "ebb195ec-2fbb-4778-a281-8ad4ec251637"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "29177",
                "uid": "cb1e41b1-b844-4ee5-94e4-3df587cc4cf6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "17541",
                "uid": "b21e470b-ad46-49af-b472-fd08ab93394d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "19402",
                "uid": "8067b4d9-9143-4cd3-b139-da9520009be6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "19949",
                "uid": "48e5898f-d8e0-420d-bdfa-3aee1dc8addb"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:59Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "29115",
                "uid": "3aa7ccf4-1e5b-4836-b4c6-778f9e51c43d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "17398",
                "uid": "39b02da2-1261-4fec-a2c2-6d40a771fe6f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:45Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "19337",
                "uid": "43fd4f14-b988-43d0-a96d-cd03ae1868ac"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "19883",
                "uid": "6492d166-907b-4741-8d72-ac4e52b7cac5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "29200",
                "uid": "7a3397c5-963a-48c6-885d-c701158ba6f3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "17513",
                "uid": "de701678-f3db-4573-b60d-1560667d344d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "19387",
                "uid": "d0dba158-1c87-4da8-847e-d78252edbe9d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:12Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "19931",
                "uid": "8b5023a2-1ac3-4710-b3bb-243bb8cf2c7f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "29108",
                "uid": "b75e873a-bba3-4c0c-a5dd-7a45ea95d10d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "17646",
                "uid": "876da253-3d57-4133-9687-a84a97c9ae15"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "19426",
                "uid": "a1e7a78c-9b38-4923-ac1d-011daf265b40"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "19973",
                "uid": "43542ca3-3b15-44c7-9ac1-32cea104a74c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:00Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "29127",
                "uid": "583a4a61-2535-4c52-8721-fa016028a4bc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "17127",
                "uid": "bfe2fb3e-e108-4627-8535-5f1e90e30648"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "18986",
                "uid": "d92edaf2-bc03-4495-8b0f-cea10a9f6308"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "20020",
                "uid": "6588505a-e479-43c5-8a63-f5452fc5f31c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "29158",
                "uid": "31df4a91-a325-4f5b-bc0c-b970c0970a8a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "17223",
                "uid": "532c7958-e6e4-4e4b-83fa-18ba6e2facbb"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:50Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "19158",
                "uid": "0d05a55a-71db-4235-8b23-1a2724fd9989"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "19609",
                "uid": "8bb3c511-580b-45d0-b90d-58279ed35f39"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "29172",
                "uid": "adf19b71-e507-4f66-9319-9a021208c447"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-backplane",
                "resourceVersion": "17169",
                "uid": "4c1c9348-ee40-4add-8c2f-705d101120e4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-backplane",
                "resourceVersion": "19090",
                "uid": "79603b06-4f9f-432e-a343-189808e9f5c0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-backplane",
                "resourceVersion": "19558",
                "uid": "94888442-47ba-4f38-9aa0-adb4aba24911"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-backplane",
                "resourceVersion": "29166",
                "uid": "960e9ecd-b246-4a65-86c9-195b0a953b67"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "17477",
                "uid": "3d308c51-1bd5-4bf2-921a-1cc369f146f5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "19369",
                "uid": "16eb8b6b-1d2c-4719-8fd7-c77bef02405b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:11Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "19915",
                "uid": "976f2ec5-6283-4d84-98c6-16f1447fd344"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "29098",
                "uid": "509b54ed-5c77-4fed-bdfc-b82a7fd3c0ff"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "17321",
                "uid": "924b8d99-9d7d-46af-a233-58df0e3b2b33"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:52Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "19309",
                "uid": "a856740d-9c66-4111-ade1-fb90a9b009f4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "19829",
                "uid": "fe958d3b-2526-49c9-8400-85bd81c6bd88"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:56Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "29189",
                "uid": "f3c9d3b4-e14e-4fc2-9f51-c7eff1e2c9a5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "17186",
                "uid": "c8077224-e190-49d0-900d-be7f3792482b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:50Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "19121",
                "uid": "639d2164-4236-4b58-b66a-0f3215a1a832"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "19573",
                "uid": "fda5d0f5-71b1-4619-83ad-512967981215"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "29168",
                "uid": "14a0ac46-d36c-4d25-88b2-cf56a5e36281"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "16949",
                "uid": "5b61b513-479b-46bf-ac00-6b65f23cb1f5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "19434",
                "uid": "83c47793-42c1-440c-a4dc-9b403eccdc26"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "19980",
                "uid": "4db3f511-844e-4179-a4c4-f1bb2e944858"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:01Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "29130",
                "uid": "3686ae23-ecc4-4ab3-bb0b-7fec939e29cf"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "17543",
                "uid": "3429dc96-59b1-484e-a636-b447ef428ab3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "19404",
                "uid": "47af3e1c-abf1-4d09-86cb-34e2a4e36255"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "19951",
                "uid": "ef316f20-b752-49d6-af78-50d681e5e255"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:59Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "29116",
                "uid": "c8543f9e-b0a4-4921-be49-fed7e940e3ab"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "16961",
                "uid": "ab9a9cae-424b-4d92-81f4-05789be370f3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:48Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "19445",
                "uid": "ec80316c-5d83-4bb1-a3d7-5d3385e42dad"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "19993",
                "uid": "bddc5a4c-bab7-440f-bf54-1ff5faa5ff32"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:01Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "29136",
                "uid": "13d39c72-a0b7-4a7c-896d-caaceaaea138"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "17332",
                "uid": "446598e8-5d81-4c32-90a8-e0aeff6e0625"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:52Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "19315",
                "uid": "75c1799e-d3ba-40ed-9bda-84b2c6759199"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "19846",
                "uid": "c6c7c3bd-0c67-40ed-bd50-6d1c133ad45a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:56Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "29190",
                "uid": "316ad4e1-7154-4bdf-803e-0c90fbc63dce"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "17444",
                "uid": "e5278276-5cb7-4266-af97-2f9c397c8a2e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:45Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "19349",
                "uid": "2da7f0ba-56af-4462-9cb2-6c5656e4a315"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "19893",
                "uid": "52639f59-3396-4119-a529-6b9282495521"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "29087",
                "uid": "1f70f288-82e8-47ea-a7d2-c41a3ff719aa"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "17545",
                "uid": "5d305694-68da-463d-a536-058e5751396f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "19406",
                "uid": "959103f0-b0cc-421d-a0ec-b1be195de0d7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "19953",
                "uid": "2a1f6881-81f1-4df3-a4d1-db07dfb16f0c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:59Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "29117",
                "uid": "f4c56b7b-11a1-4892-9db2-5d7fe3ebe94e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "17486",
                "uid": "48180ad0-4e2c-4c38-82dc-8527ac880b5c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-config-managed",
                "resourceVersion": "19374",
                "uid": "0b02b53a-dd21-4395-8a78-eb0ab61a307c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:12Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-config-managed",
                "resourceVersion": "19917",
                "uid": "51c2f79c-388b-412d-900e-fc54260bac89"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-config-managed",
                "resourceVersion": "29099",
                "uid": "3cd104ae-2be5-4b2d-a1f7-f005a4119e6e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "17348",
                "uid": "9d103205-f148-4c42-beaf-1f0a02913dfa"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:52Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-config-operator",
                "resourceVersion": "19317",
                "uid": "06fbdb08-ad06-4e1d-9d74-7bb3ffa24afa"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-config-operator",
                "resourceVersion": "19854",
                "uid": "00e01d4a-1388-45f3-b535-3cbc131d1316"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:56Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-config-operator",
                "resourceVersion": "29191",
                "uid": "a6688224-3c7c-483a-b7a7-5d1c936448ab"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-config",
                "resourceVersion": "17261",
                "uid": "e4e3811f-e6bf-495b-a0e5-02331543c4bd"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:51Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-config",
                "resourceVersion": "19205",
                "uid": "389382a2-aac7-4d76-bd36-e8d5fb83163a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-config",
                "resourceVersion": "19663",
                "uid": "bada75ca-ead3-4172-8fb0-dece580e2519"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-config",
                "resourceVersion": "29176",
                "uid": "0bb5179c-6398-42f3-b7d5-d3c41aec392d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "17139",
                "uid": "3301ec9e-5c02-44d1-803b-2b2b9716e74f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-console-operator",
                "resourceVersion": "19013",
                "uid": "ffe46fa3-b1fc-43f6-9623-c9aadf3f9ea4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-console-operator",
                "resourceVersion": "20024",
                "uid": "82d91154-ea9a-4b49-bd28-798293b6787e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-console-operator",
                "resourceVersion": "29161",
                "uid": "92addaf6-6fe2-4440-bacd-925af2d93e29"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "17207",
                "uid": "b7cc7fd0-791c-4227-8c1b-149a65234740"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:50Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "19147",
                "uid": "166a6bfb-0b87-4bf4-9940-0e9d35cdf41c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "19595",
                "uid": "7a806670-0f71-49d2-9609-88825fcf1712"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "29170",
                "uid": "a87d5ba4-21c5-4065-a837-73eed5c8273e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-console",
                "resourceVersion": "17572",
                "uid": "fd8888f7-5699-441d-8e83-4f553d9c2d9b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-console",
                "resourceVersion": "19422",
                "uid": "aea26be8-f445-49bb-a6b2-cd8798178712"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-console",
                "resourceVersion": "19968",
                "uid": "5c595c33-1454-4506-9457-9e81bb598b67"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:00Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-console",
                "resourceVersion": "29124",
                "uid": "48ea994a-0fe8-492e-b2b4-1e3d8bee0bce"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "17353",
                "uid": "c44ea77d-6e8e-4689-b9d4-f3896f66197f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:52Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "19321",
                "uid": "b4448bbc-0023-4096-a75c-0aec167c0743"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "19863",
                "uid": "1f0efc7e-bcfa-47b2-9183-cf37c54dd666"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:56Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "29192",
                "uid": "9d130ab6-589c-432a-a278-5b75e2ef85b0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "17099",
                "uid": "6ede895a-82ba-401b-ae55-56362c9595a5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "18958",
                "uid": "99c68926-69cd-4828-ba73-4a2cfe379d5a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "20010",
                "uid": "9989151b-b51b-42e0-b1df-45e6ab7ee7b3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "29152",
                "uid": "c2aa9cfd-97af-495c-b60a-9af1845570a0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "17412",
                "uid": "91072a9c-3b70-4565-bf77-f61f7747a6fa"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:45Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "19339",
                "uid": "07cd328b-c033-4515-af54-83306de89336"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "19886",
                "uid": "cf637247-910f-4156-b8c4-726fd18f56c8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "29082",
                "uid": "3ef0140f-d130-4bd6-9ee6-5bf68897b7a7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "16943",
                "uid": "cccea58a-450c-4d73-98eb-d779182697ce"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "capabilities": "Basic Install",
                    "categories": "Application Runtime, Monitoring, Security",
                    "certified": "false",
                    "containerImage": "quay.io/app-sre/deployment-validation-operator:0.1.568-g6f8f204",
                    "createdAt": "2026-03-10T08:28:54Z",
                    "description": "The deployment validation operator",
                    "olm.operatorGroup": "deployment-validation-operator-og",
                    "olm.operatorNamespace": "openshift-deployment-validation-operator",
                    "olm.targetNamespaces": "openshift-deployment-validation-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.package\",\"value\":{\"packageName\":\"deployment-validation-operator\",\"version\":\"0.1.568-g6f8f204\"}}]}",
                    "repository": "https://github.com/app-sre/deployment-validation-operator",
                    "support": "Best Effort"
                },
                "creationTimestamp": "2026-04-03T00:04:44Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operators.coreos.com/deployment-validation-operator.openshift-deployment-validation": ""
                },
                "name": "deployment-validation-operator.v0.1.568-g6f8f204",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "15055",
                "uid": "fa9884fe-c195-4747-8625-9985755f978f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {},
                "description": "The Deployment Validation Operator (DVO) checks deployments and other resources against a curated collection of best practices. These best practices focus mainly on ensuring that the applications are fault-tolerant. DVO reports failed validations via Prometheus metrics. If the best-practice check has failed, the metrics will report `1`.",
                "displayName": "Deployment Validation Operator",
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "*"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "deployment-validation-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "name": "deployment-validation-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app": "deployment-validation-operator"
                                        }
                                    },
                                    "strategy": {
                                        "rollingUpdate": {
                                            "maxSurge": 1,
                                            "maxUnavailable": 0
                                        },
                                        "type": "RollingUpdate"
                                    },
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "deployment-validation-operator",
                                                "name": "deployment-validation-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "node-role.kubernetes.io/infra",
                                                                        "operator": "Exists"
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                },
                                                "podAntiAffinity": {
                                                    "preferredDuringSchedulingIgnoredDuringExecution": [
                                                        {
                                                            "podAffinityTerm": {
                                                                "labelSelector": {
                                                                    "matchExpressions": [
                                                                        {
                                                                            "key": "app",
                                                                            "operator": "In",
                                                                            "values": [
                                                                                "deployment-validation-operator"
                                                                            ]
                                                                        }
                                                                    ]
                                                                },
                                                                "topologyKey": "kubernetes.io/hostname"
                                                            },
                                                            "weight": 100
                                                        }
                                                    ]
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--config /config/deployment-validation-operator-config.yaml"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE"
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "deployment-validation-operator"
                                                        },
                                                        {
                                                            "name": "NAMESPACE_IGNORE_PATTERN",
                                                            "value": "openshift.*|kube-.+|open-cluster-management-.*|default|dedicated-admin"
                                                        },
                                                        {
                                                            "name": "RESOURCES_PER_LIST_QUERY",
                                                            "value": "5"
                                                        },
                                                        {
                                                            "name": "VALIDATION_CHECK_INTERVAL",
                                                            "value": "2m"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        }
                                                    ],
                                                    "image": "quay.io/app-sre/deployment-validation-operator:0.1.568-g6f8f204",
                                                    "imagePullPolicy": "Always",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 30,
                                                        "periodSeconds": 10,
                                                        "timeoutSeconds": 3
                                                    },
                                                    "name": "deployment-validation-operator",
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10,
                                                        "timeoutSeconds": 3
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "memory": "400Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "50m",
                                                            "memory": "400Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "readOnlyRootFilesystem": true
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/config",
                                                            "name": "dvo-config"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "nodeSelector": {
                                                "kubernetes.io/arch": "amd64"
                                            },
                                            "restartPolicy": "Always",
                                            "serviceAccountName": "deployment-validation-operator",
                                            "terminationGracePeriodSeconds": 30,
                                            "tolerations": [
                                                {
                                                    "effect": "NoSchedule",
                                                    "key": "node-role.kubernetes.io/infra",
                                                    "operator": "Exists"
                                                }
                                            ],
                                            "volumes": [
                                                {
                                                    "configMap": {
                                                        "name": "deployment-validation-operator-config",
                                                        "optional": true
                                                    },
                                                    "name": "dvo-config"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "services"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "list",
                                            "delete",
                                            "update",
                                            "watch",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "deployment-validation-operator"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    }
                ],
                "keywords": [
                    "dvo"
                ],
                "labels": {
                    "alm-owner-dvo": "deployment-validation-operator",
                    "operated-by": "deployment-validation-operator"
                },
                "links": [
                    {
                        "name": "repository",
                        "url": "https://github.com/app-sre/deployment-validation-operator"
                    },
                    {
                        "name": "containerImage",
                        "url": "https://quay.io/app-sre/deployment-validation-operator:0.1.568-g6f8f204"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "selector": {
                    "matchLabels": {
                        "alm-owner-dvo": "deployment-validation-operator",
                        "operated-by": "deployment-validation-operator"
                    }
                },
                "version": "0.1.568-g6f8f204"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:04:44Z",
                        "lastUpdateTime": "2026-04-03T00:04:44Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:04:44Z",
                        "lastUpdateTime": "2026-04-03T00:04:44Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:04:46Z",
                        "lastUpdateTime": "2026-04-03T00:04:46Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:04:46Z",
                        "lastUpdateTime": "2026-04-03T00:04:46Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:04:46Z",
                        "lastUpdateTime": "2026-04-03T00:04:46Z",
                        "message": "installing: waiting for deployment deployment-validation-operator to become ready: deployment \"deployment-validation-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:09:45Z",
                        "lastUpdateTime": "2026-04-03T00:09:45Z",
                        "message": "install timeout",
                        "phase": "Failed",
                        "reason": "InstallCheckFailed"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:09:46Z",
                        "lastUpdateTime": "2026-04-03T00:09:46Z",
                        "message": "installing: waiting for deployment deployment-validation-operator to become ready: deployment \"deployment-validation-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:09:46Z",
                        "lastUpdateTime": "2026-04-03T00:09:46Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:09:46Z",
                        "lastUpdateTime": "2026-04-03T00:09:46Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:09:46Z",
                        "lastUpdateTime": "2026-04-03T00:09:46Z",
                        "message": "installing: waiting for deployment deployment-validation-operator to become ready: deployment \"deployment-validation-operator\" waiting for 1 outdated replica(s) to be terminated",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:10:00Z",
                        "lastUpdateTime": "2026-04-03T00:10:00Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:10:00Z",
                "lastUpdateTime": "2026-04-03T00:10:00Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"*\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "deployment-validation-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "19429",
                "uid": "923892a4-3c1d-4dcb-86f0-94ff6ea719ea"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "19975",
                "uid": "0fb950e9-7b2f-4754-a9f0-3727c85d6837"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:00Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "29128",
                "uid": "97f52e37-84bb-4dc8-bdc5-eb20043d3575"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "17467",
                "uid": "d72c5ddf-f2cb-4d6e-8067-603c4e7439da"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "19365",
                "uid": "49dd57c5-27db-421f-b92b-991836119839"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:11Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "19911",
                "uid": "db50ceb8-e40d-4052-82f6-c2e0dcf75dd2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "29096",
                "uid": "2b7ccd57-5a20-4768-ab37-d9b4c1524f4c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-dns",
                "resourceVersion": "17462",
                "uid": "f07e7715-d594-4aa5-a957-7e5353597cb9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-dns",
                "resourceVersion": "19362",
                "uid": "8d27162b-8407-42e5-a49e-6481d9c09332"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:11Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-dns",
                "resourceVersion": "19909",
                "uid": "85d2e2c5-137a-41fb-bf94-1b1a6a359305"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-dns",
                "resourceVersion": "29094",
                "uid": "5cc303f2-3435-4336-a32b-d6ecf41ebe55"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:39Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-etcd",
                "resourceVersion": "17305",
                "uid": "c1c5db98-0bb7-4983-a895-802d48070d70"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:51Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-etcd",
                "resourceVersion": "19262",
                "uid": "e7ecabd1-b845-4621-9a51-c6120cd37210"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-etcd",
                "resourceVersion": "19801",
                "uid": "3b880208-f914-4f17-8b71-6b14ba99a774"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-etcd",
                "resourceVersion": "29185",
                "uid": "e10106cc-1875-4c12-95b0-748c1ac1a747"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-host-network",
                "resourceVersion": "17107",
                "uid": "085851b1-3c77-4261-a0d2-fbd6b9607a0e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-host-network",
                "resourceVersion": "18964",
                "uid": "e22171a6-2218-453b-b599-603d63404cd2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-host-network",
                "resourceVersion": "20013",
                "uid": "43917416-46da-4a7d-a36d-766d6a3f3329"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-host-network",
                "resourceVersion": "29153",
                "uid": "fc65fb78-fe23-443a-b493-daf66662d8e8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "17509",
                "uid": "9173f427-ca77-4cc6-9007-a4ccf0e5f9c7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-image-registry",
                "resourceVersion": "19384",
                "uid": "a761a17b-927c-4984-bbd2-908db06e0ef9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:12Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-image-registry",
                "resourceVersion": "19929",
                "uid": "afb1e4f5-6bd3-45f4-9686-7bbacba972b8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-image-registry",
                "resourceVersion": "29105",
                "uid": "d667f2f5-47cd-4f53-9827-0301d72c9f5b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-infra",
                "resourceVersion": "17457",
                "uid": "24a7d626-dce1-479a-9fb1-58985fe65bcc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-infra",
                "resourceVersion": "19357",
                "uid": "2fe73c02-931d-4faf-a514-300ec6eda10e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:11Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-infra",
                "resourceVersion": "19904",
                "uid": "098b772d-725e-4fd3-853d-95cc9612f535"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-infra",
                "resourceVersion": "29092",
                "uid": "1bc8bfc2-1315-44e5-8a3e-d28e0def0814"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "17154",
                "uid": "f7efba4b-4f37-4db0-8c75-60729c2a0f90"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "19059",
                "uid": "92e6da78-4fbf-4058-ada5-948f93f77642"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "19556",
                "uid": "4633c45a-0cfd-45ae-9732-9d016d93b6e7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "29164",
                "uid": "5e56c5fc-65ad-4155-86f1-a13a7e385a60"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "16965",
                "uid": "dfe8377c-a359-4829-bb3a-de4ae80f4347"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:48Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "19448",
                "uid": "c895969c-4e27-4498-b67b-a236bd72f2b7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "19995",
                "uid": "49b9190b-b9b3-47b9-bb89-456fc2f49588"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:01Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "29138",
                "uid": "b41cd31b-f98b-47ff-9a9d-f8271ce7936c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-ingress",
                "resourceVersion": "17559",
                "uid": "070e4907-f322-4916-a57b-4235b9c55320"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-ingress",
                "resourceVersion": "19418",
                "uid": "8851b384-b9cc-40d7-b880-f8dbdcb5e5a2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-ingress",
                "resourceVersion": "19963",
                "uid": "0521d683-15ce-457c-b191-1ff80b720117"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:59Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-ingress",
                "resourceVersion": "29121",
                "uid": "22a169b7-792f-4b39-8af4-5477a0a6cb88"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-insights",
                "resourceVersion": "17357",
                "uid": "6a48a766-bfd8-4edf-9d4d-93783cbd2550"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:52Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-insights",
                "resourceVersion": "19323",
                "uid": "dbd3a58b-b950-430f-8cb9-15f4bfff1d80"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-insights",
                "resourceVersion": "19867",
                "uid": "0d47ee50-aa48-45af-818e-e5e7753dfd33"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:56Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-insights",
                "resourceVersion": "29193",
                "uid": "bd82cdd0-8752-4b0e-84ae-8ab825237d71"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "17146",
                "uid": "bf53435c-19f8-4740-9dab-aed2e903e1e7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "19029",
                "uid": "170b8008-7269-4c9e-920f-8ff6203d73ae"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "19553",
                "uid": "67aba290-69f7-440f-8d5b-62b4c6c76f32"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "29162",
                "uid": "8ad21e7f-8813-436a-8bb3-e6535ed77356"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "17557",
                "uid": "ff9f7987-806b-463f-804a-501f9e83f078"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "19414",
                "uid": "09d5c440-e454-442f-b514-e3ef9890b976"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "19961",
                "uid": "38e4986e-214a-439e-8a66-7742bf7142f9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:59Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "29120",
                "uid": "0ec07eaa-328a-4d88-8460-87f16541c3ba"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "17549",
                "uid": "d94361d1-45ca-448c-bcee-ac82e5be3201"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "19407",
                "uid": "49d69e2c-da5f-4cf7-92b9-5ba7acbe7ca4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "19957",
                "uid": "6a8bc75c-eae1-464c-a5da-1f75ce1697a4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:59Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "29118",
                "uid": "86a50f9e-3103-4e99-a3b5-89e0ef36c572"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "16951",
                "uid": "fec85fd8-2fa9-4258-bc00-b058130575ea"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "19436",
                "uid": "77cab986-7bfd-49f4-bd94-6e83d8dbe542"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "19982",
                "uid": "0dfe5913-696c-485a-a888-3c5d87ea41c2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:01Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "29132",
                "uid": "81a64dce-c41c-4c29-a8a6-11a2ac2bfa38"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "17200",
                "uid": "5dac697c-aea3-4ee9-ae1a-c81bc7247ff0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:50Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "19136",
                "uid": "2c9ca48d-d848-4116-9e69-27e36e580631"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "19584",
                "uid": "4094084d-065c-4e64-95e7-dbb2e4db69e0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "29169",
                "uid": "45ca2476-b77f-479b-99ee-5ae0a61499b2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "17150",
                "uid": "0909847a-5626-49c3-b0a7-3624a8a61187"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "19045",
                "uid": "1be83e15-ac9b-436b-9ce8-ee34c0ca7b53"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "19554",
                "uid": "f169d41d-3268-4fe8-b83f-e9ff71bf57e0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "29163",
                "uid": "9d21432f-8ef9-4d88-a64e-38966d47ddb6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "17314",
                "uid": "405485bb-0563-4b16-92bb-7edb79372e56"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:51Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "19297",
                "uid": "c12a8b07-3479-42cc-a291-59d64b89d2d2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "19821",
                "uid": "4d7f73f5-92b0-4f8a-a46d-64a30bcb2a4f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "29187",
                "uid": "042d02f2-4518-41cd-a1b8-a25fe813c755"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:44Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "17273",
                "uid": "9a19c692-8fa1-41e2-8646-a99f9eeddeb0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:51Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "19229",
                "uid": "4bbeaffe-b080-415e-86d3-c5dad7553e0a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "19733",
                "uid": "492136b3-e849-4ae6-9579-56031a31b61d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "29178",
                "uid": "47ec3888-1c70-42cd-96a5-613f464acc3e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-logging",
                "resourceVersion": "16946",
                "uid": "a6490981-387d-429f-9879-17c0713a1502"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-logging",
                "resourceVersion": "19432",
                "uid": "ae7803cc-7218-4929-8da9-20c374a0fac0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-logging",
                "resourceVersion": "19978",
                "uid": "1698a1f2-b1d8-4f72-a9a4-460e0e66e92f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:00Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-logging",
                "resourceVersion": "29129",
                "uid": "678d1bcf-ad3f-444d-937c-0a17568062d3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "17447",
                "uid": "b2ce393a-60b6-4196-979a-d70c68a91298"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-machine-api",
                "resourceVersion": "19350",
                "uid": "5510b647-1942-423d-b9f7-dbe06ae54d78"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-machine-api",
                "resourceVersion": "19896",
                "uid": "09a894f4-efe4-4ed8-88bd-9899dc675f84"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-machine-api",
                "resourceVersion": "29089",
                "uid": "e8183afa-b45c-448a-ad84-0595db738980"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "17473",
                "uid": "caa4c74f-b125-4c83-a28e-6afc17bc99be"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "19367",
                "uid": "80c0721a-60a6-4723-99ba-64d0d6c47fcd"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:11Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "19913",
                "uid": "0d6bb321-eedc-4e4c-bcec-d830d5e6bf39"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "29097",
                "uid": "e7b25369-add5-4c34-88d8-eec4b5a68d01"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "17370",
                "uid": "427e828b-f1f6-47a3-b0d1-07f13e4529ab"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:53Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-marketplace",
                "resourceVersion": "19331",
                "uid": "9af7bcdb-4672-4c7e-8ef4-f574697494db"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-marketplace",
                "resourceVersion": "19877",
                "uid": "246f403e-a2ab-4249-9717-fa4120a72a8d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-marketplace",
                "resourceVersion": "29197",
                "uid": "55d0e5b9-d3bc-4eb0-971c-77dbb74cc6db"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "17623",
                "uid": "34c884de-47ea-4838-bfca-8b66a6c2d219"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-monitoring",
                "resourceVersion": "19424",
                "uid": "6399bd56-4053-4ed3-8369-a5a1a1226c7c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-monitoring",
                "resourceVersion": "19971",
                "uid": "d9ad543e-2270-4637-a84c-6d2323be9758"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:00Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-monitoring",
                "resourceVersion": "29126",
                "uid": "2f2502a1-79e2-4990-8326-1a1490c82360"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-multus",
                "resourceVersion": "17359",
                "uid": "d43b64ff-7324-4db3-8e70-b60e657d7778"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:52Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-multus",
                "resourceVersion": "19326",
                "uid": "7cba53d7-7b36-4a3f-889d-2b029076c77a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-multus",
                "resourceVersion": "19869",
                "uid": "820c9ee5-d7d7-48b7-8617-9ab939e15804"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-multus",
                "resourceVersion": "29195",
                "uid": "1cc64032-e214-437c-bd00-0f7cdf575b0a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "17045",
                "uid": "65172447-2baf-455f-9f14-da4dbbd1ad7a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:48Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "19454",
                "uid": "07cecf15-e6e2-48b4-9fa9-58acb90af507"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "20001",
                "uid": "ff9002b0-47ce-4fe5-8584-b03a7342ccd2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:01Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "29148",
                "uid": "88353fea-9839-4d45-bfca-f952468b77a7"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-network-console",
                "resourceVersion": "17459",
                "uid": "be55c99d-ac71-4586-8458-c5a05d6559f9"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-network-console",
                "resourceVersion": "19360",
                "uid": "fd0f9716-154f-4327-926e-524f66b787b8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:11Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-network-console",
                "resourceVersion": "19907",
                "uid": "9538c873-893a-4fbe-bb72-c88ac8194b8c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-network-console",
                "resourceVersion": "29093",
                "uid": "ae02505a-1a7c-4cd6-bc25-67225a83bd55"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:41Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "17523",
                "uid": "b90bada2-9e63-4a32-a205-7266c9c64104"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "19394",
                "uid": "cbeab547-50e7-4dbe-91aa-71de0b54704e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "19938",
                "uid": "541a3ae1-c6de-44c8-8f50-7cd56f4ef046"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:58Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "29111",
                "uid": "605a9fea-17d0-406f-87b5-16f6c3c5bf9d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "17159",
                "uid": "e7ec31cc-4bf1-4ae0-a998-8fe48936b251"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "19070",
                "uid": "2ef22799-f6af-4d94-b517-de672d2e060c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:07Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "19557",
                "uid": "ef900d06-be98-452e-b038-1367bf84eb7c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "29165",
                "uid": "a5c44d22-df80-4251-af4e-d38cddeb9f18"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "17450",
                "uid": "b6c0d94c-3d23-4f63-a0fa-b71f05adc91b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-network-operator",
                "resourceVersion": "19353",
                "uid": "816d66a5-f4f6-48dd-8191-6e013b94b127"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-network-operator",
                "resourceVersion": "19898",
                "uid": "02393e9f-6d9f-4403-9b36-ac9710278710"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-network-operator",
                "resourceVersion": "29090",
                "uid": "758a1c3b-26ee-43f2-bb95-772fc5ef3cb1"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-node",
                "resourceVersion": "17553",
                "uid": "b2ee8e01-ba5b-47df-bb38-a4a1f945e522"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-node",
                "resourceVersion": "19410",
                "uid": "f5e53ad0-3a0c-4841-8f8a-e45a244db27a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-node",
                "resourceVersion": "19959",
                "uid": "98bd4cbb-a1b4-438a-a8f3-47f262ed8979"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:59Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-node",
                "resourceVersion": "29119",
                "uid": "4bee6469-e83a-458c-ab01-2e80686ae9e3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "17454",
                "uid": "a35904c8-6771-418b-8d81-3492b11ce370"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "19355",
                "uid": "d9ea25c1-1b88-4dd4-a0cd-2c2ddb52c08b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "19900",
                "uid": "db9cb175-1d9d-46b9-a33c-6471c150f83d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "29091",
                "uid": "3f2f9f93-ae7b-4de7-99b3-47aa2a88ed47"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "17538",
                "uid": "32962483-4d1e-4c88-8fc8-c7f30a313830"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "19400",
                "uid": "c24c4ccc-2582-43e7-bb5c-5dd61b534f2f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "19947",
                "uid": "9c1cc725-189c-46ed-a84d-c60e0bc594f2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:59Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "29114",
                "uid": "b7708108-2f44-40c9-8a28-8f6033c70af6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-operators",
                "resourceVersion": "17077",
                "uid": "33788229-4829-466c-8e70-89da1d8774a8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:48Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-operators",
                "resourceVersion": "18950",
                "uid": "506de95a-316e-414d-8560-1e6239267765"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "olm.targetNamespaces": "",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operators.coreos.com/openshift-pipelines-operator-rh.openshift-operators": ""
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-operators",
                "resourceVersion": "19551",
                "uid": "ec4710b5-d91c-47bd-9365-f8701919b972"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.targetNamespaces": "",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:56Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operators.coreos.com/rhtas-operator.openshift-operators": ""
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-operators",
                "resourceVersion": "29080",
                "uid": "3ac08568-3406-4cf8-adb1-19d35e64aa23"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "17310",
                "uid": "6c7c7f77-56a1-4d34-a782-fccfaa964cd5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:51Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "19278",
                "uid": "39d058cd-529b-42c3-b307-2c112eb7d3ec"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "19811",
                "uid": "410f6c31-46b2-4fa9-8399-d7b1fff82b93"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "29186",
                "uid": "6a8c0317-46e5-47b2-a442-d873493551d0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "17020",
                "uid": "c9913516-c5f8-480c-9851-6d81de183c3c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:48Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-package-operator",
                "resourceVersion": "19452",
                "uid": "72b050b4-02fc-4572-a26c-5273734d5c3d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-package-operator",
                "resourceVersion": "19999",
                "uid": "ea2dfa43-fd05-4b54-bc7a-2f065cff993d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:01Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-package-operator",
                "resourceVersion": "29141",
                "uid": "ff9dbac4-6609-40bb-9517-029a0f76e39a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "20137",
                "uid": "4699d1d5-0e36-463a-9c6d-b547f9cfdee4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-pipelines",
                "resourceVersion": "20128",
                "uid": "f51665fa-481e-4539-a3d8-f101e727f961"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-pipelines",
                "resourceVersion": "20135",
                "uid": "ad4d5df5-2df1-4721-863c-18daf6552fc4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg\nAElEQVR4nO3dbVYcx9nG8WpZlt+SSFkBaAXgFQArAK8AWIHRCoS+5ZvQCkArCHx8PglWYLQCwQoi\n4rc4UtzPuVpd8ggD03VXVU919/93zhznOJ6Znp7hmpq77qqu6rp2AIDxu8d7DADTQOADwEQQ+AAw\nEQQ+AEwEgQ8AE0HgA8BEEPgAMBEEPgBMBIEPABNxnzc6j6qqlp1zuq065x7N/FPWxvZ6AYOz9i5v\nnXPnM/+8qOv6ghOaHlsrJFBV1Xob6P62MvgXBSzea/8F4Jw7rev6lPckDoEfqKoqjdLXZ26EO9Af\nfQmc+ltd1285990R+B1UVaVR+1Z7I+CBcugL4Fi3uq7PeV/uRuDfog35nTbkl4o8SACzLtvwPyL8\nb0bgz2gnWnfaGyEPDJfC/6gNfyaAWwT+h6D3IU/3DDA+Z23wH039vZ1s4LeTr3uM5oHJ8KP+g6lO\n9k4u8NuyjQ/6hwUcEoB+Xc0E/6TKPZMJ/Dbo951z2wUcDoAyvFQuTCX4Rx/4M6WbpwUcDoAyPZtC\nqWfUgV9V1V47qqd0A2Ceq3a0fzDWMzXKwG+3OjgqdTL24cOHbnV19cb/b319vffjAXI5Pb15N4Tz\n83N3dXVV6nnX5O7OGLdyGFXgt+UbBf3moo9lZWXFLS8vN8Gu26NHjz7+E8AHb9++bcLf/1O3i4sL\n9/r16xLO0Ekb/KMp84wm8BdZvllaWmpG5j7cGaUD8fTrwH8J6H9fXl4u4qyOqswz+MBvR/XHfS+a\n2tzcbIJ9a2urGckDyEsj/+Pj4yb8T05O+j7bWry1NfTR/qADv6qqrbaEk31Ur7q7wt3fACyWwt/f\nepoPuGpLPMdDfesHGfjtqF7lm+9zP5dG8gr4nZ2d3E8FwOjo6KgJ/p5G/i/aMs/gRvuDC/x2AdVx\nzm2KNZrf29trQp5yDTAcKvso/A8ODnKP+l+3JZ5BLdgaVODnLuFo8nV/f5/RPDACCn79PWec7B1c\niWcwgd924TzP8dhra2vNiJ7aPDA+KvVoxH92dpbrtT0ZShfPIAK/qqqjHHvgaESvUQBtlMD4qbtH\nv94zjfhf1nVdfGngXgHHcCtNzlZVdZo67FWjPzw8bOp9hD0wDfpb19+8/vaVAYltK6vahpJiFTvC\nb0/caerJ2adPnzblG1a8AtOllb0q8zx79iz1OdBk7nqpHTxFBn6OThzV6fUG37aHDYDp0SpeDQAT\n1/eL7eAprqTTXjz8PFXY66fb8+fPm/odYQ9gljJB2aCMSFjmUXadt1lWlKJG+O0JOk3VdqkNzDRD\nTy89gHlU31enXsKN267a8s55KSe/mBF+W8ZJFvaq1evnGmEPoAtlhTJD2ZGIsuy0zbYiFDHCTzlB\nq59lGtXTfQPASmUejfYTrdYtZiJ34YGfMuxVwtEbRQcOgFjq5NHAMVGJp4jQL6Gkk6QbZ3t7u/k5\nRtgDSEFZokxRtiSw0mbdQi008NsVtNH72KvmphWzAJCasiVRXX+tzbyFWVhJJ9XeOFo1x2ZnAHJT\n8O/u7qZ4loXtvbOQEX6762VU2PvtEQh7AH1Q1iTaluF5m4G9632E37Yonce0X+qEs5AKwCKorq/J\n3MgOHt15te/VuL2O8GeuP0vYAxgkvzo3cqSvOx/3vdla3yWd/ZiOHMIeQAkShf5Km4m96S3w25pV\n1DVo2fwMQCmURcqkSN/3Wc/vpYbf/my5iCnlMEELoEQJundUz1/uY1FWXyP8qLq9emAJewAlUjZF\n9uk/7GtRVvYRfmy/vVa5sagKQOkU/C9fvow5yuz9+VkDP7aUo71x1AIFAEOgun7E3jvZSzu5SzpH\n1rD3HTkAMBSRnTsP28zMJlvgV1Wl/Yk3rffXFsdshAZgSJRZyq4Im212ZpFzhG/+ptIECPvZAxgi\nZVfkJG62UX6WGn7MRC11ewBjEFnPzzKBmzzwYyZqVfvisoQAxkDXyFXoG/fcyTKBm6Oks2edqN3f\n3yfsAYyCskyZZvSwzdKkko7w250w31juu7a2RlcOgNFRTf/s7Mz6sh6n3FEz9Qjf/HWWYE8KAChO\nZLYl3VwtWeC3o3vTxR81o82maADGSNkW0bWz3WZrEslKOlVVHVh2w9RErSY36LkHMFZv375tavrG\nCdwXdV0nqecnGeG3nTmm3c30c4ewBzBmyriI0s5OqgulJBnhV1WlOlPwb5alpaVmdA8AU6BR/uXl\npeWVPqvrOrqen6qGbxrdswsmgCmJyLwk+8NHB35VVTqQpdD7qQ2T7RMATIkyT9lnsNRmbZQUI3zT\nQeztJV9TAADFi8i+6MCPquFbF1pRuwcwZRG1/KiFWLEjfNM3TsRyYwAYvIgMjBrlx47wL0Lr9+q7\nV08qAEyZWjUNffmXdV2bF2KZR/hVVa1aJmup3QOAOQuX2uw1iSnpmH5a6EK/ADB1EVlovmNM4G+F\n3mFzc5PtjwGgnbhVJhoEZ69333Inazlna8t8nEAUXVjntrkj1VLZvA+LoEw8OTkJfeamrFPXdfCl\nAU2TtpatFJisRV/0OdO1Ffyt62XmdHlNLYzxN/Z4Qh+Mk7emrRasga9vlpWQ+2xvb7OVArJSuOsz\n9vLlyyRPo8+s6qysCEdO+owZPrOv67oO/lkaXMNvd20LCntHOQcZKegVyhsbG8nCXvRYekw9Nldj\nQy7GbFyx7KAZPMKvqkpH98/QJ0p9sXRAq7U1Ooq4fFwQ7YGiXxA0HiC1qqosj/hdXdfHIXewdOkE\n/741zkQDt1LwaqK1r7AXPZeek9IkUjNmZHAW9xL41ECRkkb1u7u71qsHRdFz6rlZT4KUjBkZfCdL\nSSe4NvPmzRt+BiOaum/0h9G16yY3dfWotk83D2KpPPn48ePgR6nrOqgWFDTCr6oq+BtFO2MS9ohV\nWtiLjkXHRLsxYikjlZWhQjM5tKRDOQcLUVrYez70gVjGz1FQa2Zo4AcP1VnBiFiql5cY9p6OjZo+\nYhmzMmvgBx8RgY8YKRdS5aRjpHsHMfoI/KBJW8uELf33sNJElv4IFtGNY6HtQ7RnD3NWsLL044dM\n3HbePK29nGEQdTEAViqTpAp7TYipRno9jPWlok4b4+XmPqFj1TGzKhdWyszQ8qWyuetlD0N2ywwO\nfEY6sFJoplhUpf1wdKGJeT+XNTI/ODiILh/pmP1WD0AoZaZhvkpB2ynwQ2r41O/Rm9jrHmvlotZ/\n+BW58/gVtLpP7MpwrtkMq9x1/JDAD15dQuDDInZ0//z5c3d8fGz6han76L56DCs/ygdCGTOzczZn\nHeGzAhEWMd0uh4eHSa6brMfQY1nRsQMLY2Z2zubOXTpVVWnIshZyFP/6178IfQTRqtW///3vppOm\nUXnqi+Srrv/kyZPg+6ljRxPCfP4Rwvj5P6vrutOkUcw1befiw45Q1lKI6u6pw961I31LTV8dO5R1\nECp3ZoYEftDoXiMcIJQ1JDUSz8X62AQ+LAzZ2Tmbs43wmbCFhSUk1XqZswVYj63nCEXgwyJndmYt\n6QChLHvm5CjlpHiOkvf/wTQR+CiGFj+F0graPn5N6jks29daXhOQC4GPYlj2le9zRavludgrHyUh\n8DFofW7fwVYhGLpsgU9LJvrA5wzoji4dDBolE4wNXToAMBE5f7US+Bg0bV/Qlz6fC8iBwEcS9du3\n7v3pqfvt4MC9Oz52/zO0I1pGNn0ubrI8V9fXpPP3y96eu1pedv+qquam/61/9ztfNEiEwEeU2aD6\ncWPD/fLkifvpu+/cv7/91v24vt58CXRlqV3qSlV99LrrOSxXxerymvTlqPP324sX7veZ59D/1r+7\nevzY/bq/35xrIAaBDxOFj0LIB1V9w6UI35+dNV8C/w3YKthyWcyc++jEPEeX16Kw1xfjTedv1n+e\nPWvONcGPGAQ+ginA/7262oTQvKCSkLKEZXGTLkuYs76ux7Zc+rDLa9G56XIORf+dzrnOfciXKOAR\n+OjMj0Z/3t39pPQwj4Lq146X/bOunM25n471see9Fn0Jvjdc2UvnXu+B3gvLXAmmi8DHXL58o7q8\nJaBEE7ldWAP/5OQkS2lHj6nHtugS+DH0Xug9aX4lUOZBBwQ+7qRJV1++idG1bKGuFstWxKIrU6W8\ntKAey3K1K9du2dzXKmDNoeg9CpkgxzQR+LiVRo6adA0p36Sws7NjfpTd3d0kI309hh7LKuY1WOg9\narqkGO3jDgQ+/kR1YY0YNXJMpQq4io9KIWtrQRdY+4RG5VtbW6aJXN1H97WO7EXH3qU09VmGJfR+\ntE9tHzch8PEJdX80k4GJL97x+dZW0H+/33GS9zaquz9+/LgZaXfp09d/o/9W97HW7EOPvXr0yH3x\n/fdRz3UTjfZV2/+th3ZVDMt93i+4mQVU/zW0H86j0f1XgQHuR/lnxkliT+2UuuniJXpMbXGs2rrf\ndE0jeq2gtSyquknX0b2n86Lae+ovWNEiuHenp+6bo6PmywUg8NF0i/y0tZUldOTrgwN3z7CXvCZN\ntVL1quOE710U6JZe+hC6+HTopLGC+K+np835t3ZA3eXdyUlT4vnL8XGWEhKGhZLOxPkunBxhf39t\nzf3thx/cA+MEpkbjfayiTUXHarlIig/9v7561Zyz1JoJ3fV1FmuBwJ+ypl6/sdG5ZbKre0tL7i//\n/GcTYrGjStXVrW2afdIxxnbm3F9fb86Zzt09w/Vz76L3WIu1ui6AwzgR+BOlev3PEW2HN1Gt/uvn\nz93Di4vgSdq7qExi2WOnLzq2lP3/Onc6hzqXId1NXWg9xc89t4yiHAT+BOkPPmXLpTzY3m5C6otM\nWxxoYrXE0Ncx5dqiWedS5/RB4l84mphXGY9+/ekh8CdEf+CaHEzZiaPSg2rPuTtB1FlTWuj7sM+5\nolbnVOdW5/izhK9dczbNLp2E/qQQ+BOhP2z9gb+L7DGfpR7yv52fN7XnPihY1S9fQk1fx6Bj6Wv7\nBJ1jnesvnz5N9piE/vQQ+BPgwz5VJ44f1avdchH93aqXHx4eNm2QfdNz6rlT1uxDqG9fnU+pJnUJ\n/Wkh8Ecuddh/vrnZ66j+Nn4FbcwWDKH0XH5F7iKp80nvQaraPqE/HQT+iKUOe3WNaAFPKas21fOu\nGvqrV6+yBr8eW8+h57L02efga/vfHB4m6eQh9KeBwB8xdeOkCHsFisoIuTpwYmkrAx/8qer7Kt3o\nsXzQW/fpz02L2pr1DgkmdAn98WNrhZFS2KeYoFWQKFCGsBeLQlk3rXhVSPvb645feuq68Y+hW18T\nsrFU4km1PYMP/aG85whD4I9Qqk3QVCNe1MRsDAW1tjjemln8pdr721tGrvrvVwe+z4zfnkFf9LHv\nvUJfn6Fv2IphdAj8kdF2CSkWVSnsx/QHP/RA70rv2eftdYdj6EtDXyJfs8XyqFDDHxFthJZiuwRN\nBDK6Gy7V9fUextLAgQ3XxoXAHwm/xXEsBYV1d0uUw4d+bAePBhBcPWs8CPwR8FsmxO56SdiPi+/g\niQ19OnfGg8AfAU2wxbZfEvbj5Dt4YkJfA4kUvx6xeAT+wKnGGtuVQdiPm0I/dk5G7Z7spT98BP6A\nqbb6S+RiKMJ+GrTHfuxErvbSf59pK2j0g8AfMPVcx9Tt1XpJ2E9Hiu6dZq6Iev5gEfgDFVu3H1uf\nPbpR6Gtba6vmUokMEgaLwB8g/ayOWVyl7RJYUDNdeu+166mVtux4d3w89dM4SAT+AMWMsNStwT4p\n0K+7mA3XmnIipZ3BIfAHRp0Sv19emg+asIdr995ptro2tmuqtBPbMID+EfgDoq4cdUpYaT/7zyay\npwzmu7e8HDWPo3ZgunaGhcAfkJgRlWq2pe5nj8VRu2bMJC4TuMNC4A+EFlhZ9zrX9U/pyMFtNIlr\nreervMiCrOEg8AdAk2Mxf1QKe+r2uEvzGTHW8387OGACdyAI/AH4z8GBeaJWP9cXfcFxlE9zO18Z\nBxWawGWUPwwEfuE0cvrN2DOvUo71jxjTozme+8aLwWtdiLboRtkI/MJpdG/dPoFSDkLFLMhjlF8+\nAr9gGjFZ2zC1dQKlHIRSaefLp09N501tmozyy0bgF+w/xtGWJt/YOgFWX+7tNeVAC0b5ZSPwC2bd\nr0R1e0o5sNJnxzr3wyi/bAR+wSydORqZscAKsbSrpnUCl1F+uQj8kaGUg1RiRvn05ZeJwC9YaB1V\nI7LPufYoEtGkv3WUb51/Ql4EfsFCw5uee6RmHuWzlUeRCPyCNZOvHZe7ayRGGyZSs47yNf9E6JeH\nwC+YuiWa/evnhL42vvoLVyBCJuZRPp/J4hD4hdNCGIX+bZek0145XNQEOVlH+boUIi2aZbk/9RMw\nBAp9P4LXRVB8B4T+PUGPPnyxs2PanltrSWgTLgcj/IFRyDcjrvV1wh69UV++ZfUt3TplIfABdPLA\ncHUrTd7qVynKQOAD6OQL4+UMf6NbpxgEPoBOdNHz25oH7mLdEwrpEfgAOntgWMmtsg7dOmUg8AF0\nptXflmvfMsovA22ZC3Z+fu7e3rLR1KNHj9zq6uqEzgZKp84whb42SAvxX9ozi0Dg90jBfnp6+vH2\n+vXrTk++srLi1tfXP94e0Y6JBXpgCHz18Gv9CK3Ei0Xg90DhfnR05F4G/pF4+mLQ7cWLF82/2d7e\ndjs7O034A32z7tn0XivG2c11oajhZ6SgVyhvbGyYw/4meiw9ph5bzwH0qSnrWLp1+KwuHIGfwcXF\nxcegPzMsR+9Kj+2D/4IuCPToc8MonwVYi0fgJ6bSjSZacwb9dXouPecRC1zQE0tZx7IXD9Ii8BNS\nXX13d9ddXV31/tx6Tj33jnE1JBCi2bjP0J75nrLOQhH4Caj7RiPslHV6Kx2DjuW2Vk8gFcson7LO\nYhH4kRSsqqF3bbHsg45Fx0ToIydLHf89gb9QBH6k0sLe86EP5PKZYVEgI/zFog8/gurlJYa9p2PT\nMTKZi3mu19a7lGtMJR3j34vl+PBnjPCNYhZS9UnHSODjNrrQ+NXysvtxY+OTm/5dl4uQ63rKoUJG\n+bHHh08R+Abqed8b0L4gOlb69HHdzzs77ufd3WY3y+v07/T//Tyn68tS1qk7zi2lOD58ipKOgcok\nqVovl5aWmlr78vLyJ/9eAa1VtJc3fNhD6Vh1zKzKhafRcZf9cPx/880to+l71z63XWjF7bySjIK8\n6/Fp8thyNa4pIvADKTRTLKrSfjgaec/bDVO7aR4cHESXj3TMfqsH4Nf9/c7n4K7QV9j+59mzoPM5\nb4TfNew9vRYCvxtKOoH2A/5QbrK5uenevHnzcUXuPH4Fre6zadi/ZFbssWMcVEO/qUxyFwXwTeUT\ny+6Xd9XwQ8Pecd3cIAR+gNjR/fPnz93x8fGfyjdd6D66rx7Dyo/yMW1da+jX3RT6lhr+bSxh71lf\n09QQ+AFiul0ODw+TTPTqMfRYVnTsIMZtI/0QN+2pExP26I7A70irVq11dI3KU+5xo8eyjvT1K4EV\nuNMWexGS66F/f20t6vFShD0XVumGwO/IWgpR3T1HC6ce01LTV8cOZZ1pUxnm3tJS1DmIHen7EkyK\nsNdrSVlaGjMCvyNrSKrDJhfrYxP4+CrBBL4PfUtrpiZZU5VxUryWqSDwO7KEpFovLRO0Xemx9Rx9\nvBaMi9oYHxg+O9cpsC0dMr/+4x9Jwl6vgZbM7gj8jix75vSxGtfyHCXv/4P+qK8+Rehb9sd5/3//\nF/28OvbbFoThZgR+B+eGEYxW0Hbps4+l51gy1GMtrwnjkyr0+0bY2xD4HVi6Wvpc0Wp5Ljp14A0t\n9Al7OwI/k5y1++v6fC6M01BCn7CPQ+Bn8oi+YAxM6aFP2Mcj8DOhZIIhKjX0Cfs0CHwAnygt9An7\ndAj8TPq84AgXN0FqpYQ+YZ8Wgd+BpR7f5+Imy3Mxx4B5Fh36hH16BH4Hln56Xamqj153PYflqlh9\nrBHA8C0q9An7PAj8jlYMF2vOuY9OzHNYXgumq+/QJ+zzIfA7sixu0nbKOevremzLls1c5hCh+gp9\nwj4vAr8ja0jm3E/H+tgEPixyhz5hnx+B35E1JE9OTrKUdvSYemwLAh9WuUKfsO8Hgd+RulosWxHL\nkydPkl5aUI+lx7TQa6BDBzFShz5h3x8CP0DMZQp3d3eTjPT1GHosq5SXWsR0pQp9wr5fBH4AlULW\nIq7fqVH51taWaSJX99F9rSN70bFTzkEqsaFP2PePwA+0H3k5NdXdHz9+3Iy0u/Tp67/Rf6v7WGv2\nXuyxA9dZQ5+wX4z7U3zRMfwo/+zsLOpx1E6pmy5eosfUFseqrftN1zSi1wpay6KqmzC6Ry4+uLte\nspCwXxwC30CTplqpenV1Ff1YCnRLL32Ihw8fJp00Bq7rGvqE/WJR0jHQaLyPVbSp6Fi5SApyU5B/\nc3jo7t1wyU39O/1/hP1iMcI3Ul1dJZfco/NYasOkMwd9ebCz09zeX9vQ7z7lxCIQ+BFUJtGk6mvD\nVfv7oD1zKOVgEQj4MlHSiaRRfombkemY+tyiGUD5CPxI6qwpLfR92LOiFsAsAj8BBatKO9atF1LS\nMehYCHsA1xH4Calefnh42LRB9k3PqeemZg/gNgR+Yn4FbcwWDKH0XH5FLgDchsDPQD3vqqG/evUq\na/DrsfUcei767AHMQ+BnpK0MfPCnqu+rdKPH8kHPdgkAuqIPvwcKZd204lUh7W9d+/fVdeMfQzcm\nZAFYEPg9UlBri2PdPNXe/YZp1+m/1549AJACgb9gBDqAvlDDB4CJIPABYCIIfACYCAIfACaCwAeA\niaBLZ0B+v7hobt5nq6uuoicfParfvnX/m7n4/r3l5eaGYSDwB0B/YL/s7bn3N1w4/Yvvv3df7e8T\n/MhKQa/P4E3XrL2/tua+PjhoBiAoGyWdwinsf1xfvzHs5bcXL5r/v75l8RYQS58tfcZuu0C5Ppv6\n/2dH/igTgV8w/4dWX13deZD/e/3a/TSzehdISZ+t/83ZBkSfUQYe5SPwC/br/v7csPc0yrp+4Wgg\nlj5Tt/26vE6fVX1mUS4Cv2Dvjo+DDo4/NqQW+pkK/cyiXwR+wX6/vAw6OI3E+INDKvosdR3de6Gf\nWfSLwB8ZdVIAKfBZGh8Cv2D3lpaCD04jrN8ODiZ0lpCDPkOW0brlM4v+EPgF+9zYedNM9tItASN9\ndqzzQdbPLPpB4BfsS+NPanVL8HMcVvrsdO0Ou876mUU/CPyCacn6l0+fmg5Qi2Ro00QofWZuW2A1\njz6rbLNQNgK/cBoxVQ8fmg7y550dSjvoTJ8VfWYs9BlldF8+Ar9w2iPnC+Mfkibd6M1HV/qsWNsq\n9RllP6fyEfgDoJGTtftBe+1Q2sE8+ozos2Khzyaj+2Eg8AdAI6evIkbqlHZwl5hSjrBb63AQ+APx\nYGen2YbWQj/TY/6gMW76bFhLOfpMPuCzNRgE/oB8HbGg6t3JCQuy8Cf6TOizYRXzmUT/CPwB0QUm\nrG2a8suTJ+xZjo+aC+s8eWI+IfosctGTYSHwB0b10pjl6+xZDjdzrQUrfQZj5pWwGAT+AH1zdGQ+\naH+hCkxX1wvr3CXmM4jFIfAH6P76enMtWytdvYhJ3OnS1gnzrmB1F3327jNoGCQCf6Cai0avrJgP\nXsvn2W9nevRFb906QfSZY6J2uAj8AdPPauu2C65dlPVffppPht7rmLDXZ41SzrAR+AOmDonY0dbP\nu7uE/gToPdZ7HaP5VUlXzqAR+AOnRS8PtrejXgShP24pwl6fMRZYDR+BPwKx9XxH6I9WirCnbj8e\nBP4IaB+TvxwfR9XzHaE/OinCXp+p5rPFXjmjQOCPhC48oT/MWIT+OKQIe9FniouajAeBPyLqjf7m\n8DD6BSkoaNkcLrVepgh7fZbotx+X+1M/AWOjibX35+fmvc093V8rMlW7HcPP+fPzc/f2li0lHj16\n5FZH0H2i90tf1DGtl54WVzFJOz4E/ggppPXHH/uHr/trg62/np4OKvQV7Kenpx9vrzuuKl1ZWXHr\n6+sfb48G9Jr9dgkxK2g9deQwSTtOBP5IaYGMQiBm61vXbsNwtbzchH7pPdgK96OjI/fS+EWnLwbd\nXrS/jra3t93Ozk4T/iXTl3Ls3jje55ubLK4aMWr4I6Y/3Nh2TdduuPbvb78tdj99Bb1CeWNjwxz2\nN9Fj6TH12KeFXiZS74nemxRhr88KYT9uBP6IqQzTjMwThL5r99P/aWurmO2VLy4uPgb92dlZtufR\nY/vg13OWQO+B3ouY/exn6TMytNIdwhH4I5c69FUi+vfq6sIvjK7SjSZacwb9dXouPefRgkfBOvd6\nD2LLdR5hPx0E/gSkDn1d//THjY2mI2QRo33V1Xd3d91VgjJGKD2nnntnAR0svgtH5956DdrrCPtp\nIfAnwoe+JuVSUetmn6N9dd9ohJ2yTm+lY9Cx3NbqmZof1ce2287SZ4GwnxYCf0L8Fgyxm63N8qN9\nLfbJOdpXsKqG3rXFsg86Fh1TztDXOdW5TTmqd23rJVsmTA+BP0HqxIi5YtZN1LOv9s1cnTylhb3n\nQz8HnUud0xQLqWbpvacbZ5oI/InSwpoU2zDMUmugukYUUu8S7OvjqV5eYth7OraUNX2dO51DncsU\n7Zaz9J6zqGq6CPwJ09L5v756Fb3L5nUqPfz03XfNYqDY+n7MQqo+6Rhju3f8Aiqdu5TlG9fueqn3\nmu0Spo3AnzhtjvW38/NkHTyz3p+dNbXnZhWooc6tnve9AW3ipmO19ulrd0stoHqfoc1U763eYzZC\nA1sroNn+Vt0aqTbeuq4J/vX14I4QlUlStV4uLS01tfbla1v9KqC1ivYywYhax6pjDl2V+/vFRbbd\nSf2+OEzOwhH48BQImsj7fH39Q3994tqx9uT5dX+/c/1YoZliUZX2w9HIe95umNpN8+DgILp8pGP2\nWz10pfOS+nyrhKNzTQkHsyjp4BNNXT/hIq1ZfsvlLvb396Oea3Nz07158+bjijFpppAAAAw3SURB\nVNx5/Apa3Wczcq1C6LGnnOB2M4upCHtcR+DjT7Qrpmq+qVs3XTsxOU/s6P758+fu+Pj4T+WbLnQf\n3VePYeVH+V2lHN3rPWvmZEawvz/SI/BxK5UE1Nlxb2mp15MU0+1yeHiYZKJXj3EY0bba9347eo/0\nXtFyibsQ+LiTOjseXly4L58+7eVEadWqtY6uUXnKfng9lnWkr18JXVfgxrbF6r3Re0QXDuYh8NHJ\nV/v77m8//ODur61FnbB5F8S27juvunuOFk49pqWmr46drq/l860tw5G55r3Qe/JV5HwHpoPAR2eq\nC2syUKs1LWUeBVSuwD/IWMqwPnbX16LADhnl69zrPRjCVchQFgIfwdT9oYlBlRK6BpVvE5zHEvhq\nvbRM0Halx942bDjX9bXoS7DLudE51DnXuacDBxYEPkzUt6+RaZf6frOsv+No1LJnTh+rcS3PEfJa\nmi/RW0pmGtH7On3za4BFVDBi4RWi+OD/Ymen6Sd/d3ra7J+jVkMFlerTXUPqvEPL5nVaQdulzz6W\nnkPPFboiV6+p6/H5kplW3v7ebtGg0f+8MhjQFYGPJBRKX+ztNTcry77yubYmvu25QjuILK+JkEcu\nlHQwaDlr99f1+VxADgQ+Bu0R9Wygs2yBb6nHAqH6uqYs0Bdra3IX2QKfP0QAKAslHQya9YIjFn0+\nF5ADgY9iWOrxOX/+pngu5hhQEgIfxbD006svvo/5Ij2H5apYfawRALoi8FGUFcOFV3LuoxPzHJbX\nAuRElw6KYllIpcVQOevremzLls19LgrDeOTMzpDAD7oEUaqLT2NarCGZcz8d62MT+LAwZGfnbM5a\n0qE1E6GsIXlycpKltKPH1GNbEPgIlTszQwI/+Ego6yCUulosWxHLkydPkl5aUI+lx7TQa6BDB6GM\nmdk5m0MCP/hIGOHDIuYyhbu7u0lG+noMPZZVykstYjqMmdk5mxnhozgqhaxFXEpRo/KtrS3TRK7u\no/taR/aiY6ecA4tBj/AJfFjtR16nVXX3x48fNyPtLp9D/Tf6b3Ufa83eiz12TJcxMzvfqarrutt/\nWFXaG/ZNyFGoD5nQh5VGyWdnQc1ht9LFS/R42uJYtXX/01kjeq2gtSyquolG932u/sW4aKGe4apv\nj+u67vRztnPguw+h3/0/boU8PjBLYaw/gKG0+D58+LAZ4LBvPqyqqgq+Z13Xne8U2pYZ/NXDaAdW\nCs4+VtGmomMl7GFlzMqgTA4NfOr46JXq6tY2zT7pGOnMQYzc9XtH4GMI1A9f8r40OraU/f+YplEE\nPiUdpKDPUYmhr2PiM44UjJ+joEwOmrR1xonbN2/eUNtENHXWqNPG0MWQhQ97VtQilhoU1BIcKmTC\n1hn30gn+azs+PjY8DfApBat+9pZQ09cx6FgIe6RgzMjgLLYEfvDvDn7yIiXVyw8PD5s2yL7pOfXc\n1OyRkjEjg+9kKelsOef+GfpE9OMjNf0MVmdMqsVZ82hRlYKe8iRSs/TfO+e+q+s66KdBLyN8R1kH\nGSh4NTJ69epV1N478+ix9Rx6LsIeqUVkY3AWBwd+XddvqeOjJJrI9cGfqr6v0o0eywc9m6EhF2v9\nvs3iIMElHffh54d2h3oach/9AbFdMvqgz5lC2t+6dvWo60bB7m9MyKIP+pwZtg95Vtd18C591sDX\npfh/CL2fJrtYjYhFUEfNbQMO/cFpzx6gb5oTMl534du6roPXRZkC330Ife3OthRyn83NTUo7ANDS\ntRcM23Ff1nVtmkyKuaZtcHLrhVkuSgEAY6MsNF57wTxqjgl8UyMy/csAEJWF5juaSzrOWNZh8hYA\nzJO15nKOixzhO8s3jV4go3wAU6YMNF7YJyo8Y0f4wZc9dO3l5qjlA5gqLeAzXlaz8+UMbxI1wm+f\nOHhdu14o3ToApkjZZwz7s5iwdwlKOs76E2NIl64DgFQisi+6Fh5V0vn4IIbJW9GydZasA5gKrfze\n2NiwvNqoyVovxQjfWb95WHULYEoiMi9Jp0uqwNdvlPD+ostLOnYATIKyzli7v2ozNlqSko77UNbR\nAX0fej/15atjh42qAIyV1h6pM8fYivmiruu9FKcm1QjfWb+BdAKYwAUwZso4Y9i7VKN7l3KE7z6M\n8lWfMW1I/sMPP7BjIYDR0U6t3377rfVlvazrOtlkZ+rANy3Ecu1Vhbj2LYCxUSdixGU4oxZaXZey\npOMXYj2z3FcnhNIOgDFRpkWE/bOUYe9Sj/Ddh1G+Zl91kA9D76sJXP384bqhAIZOzSgqUxtr97rT\nsuUyhndJOsJ3f1zzNvjSW66dwNUFAQBg6JRlERO1+6nD3uUIfPch9FWbMTWc6vqj+/um7wsAKIIy\nrOu1lG9w2WZocslLOl5VVdoz4ZX1/my7AGCIIrZP8Dbqus7SwZIt8N2H0NeWmJuW+7IgC8DQRC6w\nkpO6rrPVtbOUdGbsWLZccG09nxE+gCFRZkWE/VWbmdlkDfyYCVzX1vPZYA3AECirIur2LtdE7azc\nI3w/gWtuRH358iWTuACKpoxSVkU4yzVROytrDd+L6c33Dg8PGe0DKI52wdzd3Y05rCw99zfJPsJ3\nf5R2otJaJ5StlAGUJEHYy04fYe/6GuF/fDLjFsqeOnfU8sQmawAWTbsCRE7SupRbH3fRd+CrtKP+\n0hXrYxD6ABYtUdhrhne9r9G96zvw3R87ap7H1PMJfQCLkijsdefV1JujzdNLDX9W+wKj6vm+R5+a\nPoA+KXMShL1r6/a9hr1bxAj/4xNXlepWz2Mfh+4dAH1INEErT/powbxJ7yN8r33BUY2rru3eoU8f\nQE7KmERh/3JRYe8WOcL/eABVpUnctdjH2d7epsQDIDlVECIXVXlaXLXQ/WJKCPzozh1vZWWlmcxl\nwzUAsbQRmur1kdsleL135NxkYSUdrz0B6+0JiaI3RjvVcW1cADGUIcqSMYW9KyHw3R+hv2XdWXOW\nZs+1FzV1fQAWyg5lSIJOHNdmWhFh70oo6cyqqmq1Le+Ye/RnqcRzfHzMNXIBzKXrb+iyhIlG9W4m\n7M9LOftFjPC99sSspxjpu7bEo8VZunI8ANxGGaGsGHPYu9JG+F67Gvc4xUSut7a29vFNBQDXrprd\n29tzZ2fmHdxvom+NrUUsrJqnyMB3ibt3Zj19+rR5g+nkAaZLHTgaAD579iz1OShmgvYmxQa++yP0\nj1P06c/SXjx6s1mhC0yP1uto0JdoUnbWWTuyLzLsXemB71VVpRVV26kfd2lp6ePeGADGTa2WGuRd\nXl7meJ1aQVv8CLKoSdvbtCfySerH1Ruv9isFvrp5AIyP/rb1N66/9Uxh/2QIYe+GMsL3qqpSr/5R\nqrbN6zTiVw8upR5g+PTrXX/PmULetZ042vVyMKPFQQW+y9TBc51q/KrxKfjp4QeGQ730CnrN0WWo\n0c8qthPnLoMLfPfHZO5+zOUSu9rc3GwWYzDqB8qlkFfp5uTkpI9jfKH8KXly9jaDDHwvd4lnlkb9\nCn5/A7BYCnh/yzya9wZXwrlu0IHvMrZuzqORvyaCFP6UfYD8VK5RuKvbpqeR/KziWy67GHzge+0V\ntPb7GO1fp8lehb9W8epGmycQT8GulbC66X9nnHy9y1VbvhnF/iyjCXz3x2hfJZ7NRR+LNm7TyN9/\nCWhlr/8ngA+04lWB7v+pm0byCfe0iXHSlnAGPaqfNarA96qqWm+Df6mMI/oz7e1zE34dYExuuzaF\ngr2nurvFZRv0o7uwxigD31tkmQfA4IyqfHOTUQe++6PMo+B/WsDhACiTdlE7GFP55iajD3yvXbC1\nn2NPHgCD9bId1Q9qAZXVZALfa4NfI/4dSj3AJF21c3wHUwl6b3KB782UenZKntwFkMzlTNCPunRz\nm8kG/qyqqnba4O918RaAXmjR1FFd10dTP90E/oy23LPDqB8YPD+aP5pa2eYuBP4tqqpabYN/i/AH\nBuGy3WblqLSLh5eCwO+gDf+t9pZtW2YAwV63IX9MyM9H4AdqJ3vXZ258AQD9UcCf+ttUJ1+tCPwE\n2q0cVmdufAkA8RTu5/42xq0O+kbgZ9JOAC+3XwKPZv7p6AYCGmftP9+2oe7/ecFEax4EPgBMxD3e\naACYBgIfACaCwAeAiSDwAWAiCHwAmAgCHwAmgsAHgIkg8AFgIgh8AJgC59z/AwXeQIk3mH5TAAAA\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:27Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-pipelines",
                "resourceVersion": "29184",
                "uid": "c323084f-0f62-4da0-8cd7-368b4c25010c"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "17565",
                "uid": "29af2183-96f1-4fd1-95f4-9961dff9ed91"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:47Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "19420",
                "uid": "0ce6b1ef-d8ca-4c72-b7d6-5d9bfd91ad76"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:04Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "19965",
                "uid": "a928436d-eb67-497d-934a-8c2be467a7cb"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:00Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "29123",
                "uid": "396f323c-8d30-4ef6-ab1b-704379973610"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "17374",
                "uid": "bae7b81d-56ef-4450-b643-5a96ad4de51b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:45Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "19336",
                "uid": "6dcce8ea-3554-4957-9806-9675635a9a5f"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:09Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "19879",
                "uid": "8e151532-fe15-4bea-884b-04db158ae5f2"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "29198",
                "uid": "f0870947-ca00-4270-b397-8bf0468cfcb8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "17234",
                "uid": "53620364-3862-4b39-9bbe-270d85cb2157"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:50Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-service-ca",
                "resourceVersion": "19172",
                "uid": "956647d4-c0e0-47ce-8550-80d0ce3899c5"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-service-ca",
                "resourceVersion": "19621",
                "uid": "8ad2fdd4-8362-490c-b2f4-c5ed04b9fae1"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-service-ca",
                "resourceVersion": "29173",
                "uid": "a66e74e6-2b67-4d4a-a422-9554f724105e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "17089",
                "uid": "198c39b5-6e71-4948-9daf-e95b399da8e4"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:48Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "18953",
                "uid": "ca12fc39-5c1e-4563-8bbe-568b7d1c7752"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "20008",
                "uid": "781a60d3-b0a3-4378-ab69-b7d7920b6bed"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "29151",
                "uid": "70f52126-61a0-45ba-ac0d-027bb8bb5a2d"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "openshift",
                "resourceVersion": "17133",
                "uid": "f7425ab2-1c6d-4e1c-8e79-7769eb4b3461"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:49Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "openshift",
                "resourceVersion": "18993",
                "uid": "55e5f06b-fc08-4f24-94e9-1af80a72f0bc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:06Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift",
                "resourceVersion": "20022",
                "uid": "70ba8d5e-ea21-4f8e-8d8e-521fb5aa8119"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:02Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift",
                "resourceVersion": "29159",
                "uid": "4e707f67-86d7-469b-8036-7b6305498c42"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:44Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "rhbk-operator",
                "resourceVersion": "17281",
                "uid": "1a7f5aac-bc71-4fc7-b812-c09cf43e7ad8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:51Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "rhbk-operator",
                "resourceVersion": "19237",
                "uid": "cb9e00ba-875d-4e8c-8bcb-de738c07e37a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAIAAAACACAYAAADDPmHLAAAAIGNIUk0AAHomAACAhAAA+gAAAIDoAAB1MAAA6mAAADqYAAAXcJy6UTwAAAAGYktHRAAAAAAAAPlDu38AAAAJcEhZcwAAdTAAAHUwAd0zcs0AAAAHdElNRQfqAREULTZacU/UAAAuHElEQVR42u2dd3Rc133nP/e9Nx29EQTYe5FIqlNdtgpJFatZ3ZaLEifePU6cnN2s7Tg2tbGz2SS72eRssonXWZe4ybJj9a7IqlYhKUosYidAopfBYAZTX7n7x32DQswM2gwAZvd7zjuDg3nzyv397u/+7q8KziJc84rE9EDlIDiABLwSYep4pMSjSTyA19FYqDmslZJlCJYAzQjqgVohqZbgQx0B9zJJwHQ/+yX0C0EfkjYhaJGSVgGHgF4JppCYaGTCDZjVPeoChgN/8m14bhvs3CnmeqgmjXn/pDt3SnZ+E3Y86w60CY6B4YBfQkCDWinYLOECTbIZWCuhDtDd99Pcz9FHrneXoz5HH1leswV0SjgsJHvR2GVr7NccIhKSHodUNIQdSoCjw7pD8De/D4j5PcTz9ulueEIiJRgapP3gt9AdhzIpqNAk50i4SsLVAs4B/DmIXQqMZgoHSCDYK+HXmuR1zeGIrRGTBkOeFLbpcdlQwvPb5+dQz7unuuFpOfxg77wEW6+lXJNUOzrrkVwH3AysAIwSE3uyyDKFCRwDnkXwooSDQjLgiRA3q0Bo6qxnb5zrxx2LefE0O3dKnrgZFnYpOWuCbkANkuUCrkVwF2qme+b6WSeJFLAHeBR4Fckpw0vYMpHZFWG+MMLcPoWU3PMIRCvB0iCYwcjoNDqSTQLuAG4BGmZ8G0ZWeDnBuWLUqBRpcNqBfwGeAA7oOt2Og5P9cq4ZYc7ufsNTEkeA14Z0FZovyiIpuETCfcB1QPlUrykVTw3/LQCvDj5NfRpC6RSaUEf25R3pankSLAcsCWkbUpb6e/RACTHtQRsAngEeAXYFyuhKxpC2e+0Xbp4bUsz6Xa9/XGLb4PFCuQ+iGRo1waVI7gNuBEKTvVaW4NlZHTKgwgtlHvV3uQeqfeqo9ELQgJAHvJpiBI+mfmfaYErI2BC31BFOQW8KBtOQsCBhQ8KEQROS1sjgTYMhIsDjwKPS4W2PTr9jQ00MhgLw2O2zS5LZu5uUPPhD6GwEnwAzRZnQ2Qp8ErgbqJ7spRypjoChiFvjHkvKYGk5NIVgQUARfaYwHehPQV8KupPQEoPTQxBOqyOSVtIiK1WmgG7gJ8CvPDbvpb2kDBukmN1lYVbudN2Trrh3YOFh6NzIeiR3AJ8BVk/mGlmiezRoCIwQe7l7LC5Ts3o2kLLh1JBihpYonI5Dexy6EkqS6FPb/n8o4AfAM06cQ0ZQGZUcAU/eUnrylPwOO55RAloXkLIpNzR2IHkAuMndJReE48r3Wr8i+vJyWFsFm2rVrJ8P6E/BwQE4MADHo4o5wmlllJikVDCBZwR8z3B4Pu0hpbnv/dyO0pKopFe/5hWJkQGRBsNgjZR8Gvgc0DzRb22pHq4pCOfWwsZqWF+tmGC+wpFwMgYfReCjATgQho6Ea6Ga3EgfE/B9qfETLE7qEoIpePTu0pGpZFe+7kmJJqFzCaKpjR1C8JC7rSu4l3ekEp+LQ7C5FrbUwZZapdidTYiZsLcPdvXCB/3QmVD/nwQjpIFfAf+QKOfV8ihosnTLQUmuesNTEgFYkpBH40Hgi8C5hX6T1eYXlcHWBkX4DdVKmz+bMZhRkmBPH7zbA13JsVvQAnhbwP/y2fws4SMjSmROLvoVt7mmXClZqAl+D/gs0FjoN7aECg9cugCualLiPniWE/5MRDNKErzaqaRCwlJ60QRoBb4rDf5OsxmgBIajol4tS3xgtYCvAPcU2tdLqWbDmiq4YRFc1AD1/qK+37xDRwLe64EX25TCKCcmwiDwIyH4KylpAXjupuKRrWhX2vGUIr4juFDA11wtP+9O3JFKi9+2GC5vhOUVylL3/wJMB45F4dft8HK70hcm0A1Srl7wp0g+AniuSJbDolwlS3xgqxQ8DFw70RZveQXcvQIurD/7FLxiYSCtpMEvTirj0gQwgaeQ7AQ+pEhMMOMrbH9aIhT9r5aCbwJX5SO+RBlyLm+EO5bBisrizHoplTGmNQY9KYhllE3fqytrYFMIVpZDzTxcXkwHDkXgkWOwt1/pQwVgAc8j+QawRwp4fobLwYx+vX1kzb8M+BZwtRuUkRPlHrhjOXy8WVnzZoohE97ocrXrhLLhp2w1qFn9wqMpk3GVF1ZUwNUL4dya+Reo0x6HZ07Ds62QtAueagHPSbXM7tNmaDqe9i93PCOznrcLgW8XEvsCNfseWgsXNyiHzExgOvBWNzx/WpljIxmwXQdrLsJmPYR+HeoCcF4t3LhEMcR8wmBG7RJ+dFRJsUJDADwpBH8MHJJi+hbDaf1q+7PDYn+NlPw58IlCxG8Mwu9sUAPvndD4O/Eg/fQYvNUFfWnXcDTJ32bllU+DRSHJbcvg44vEZLZjs4akBe/0wHcPKY9kgRXBBH6OxleB0449PZfylH9xw/MSTTmxG3D4luvQyanta0KZbn93gzLqeGborGmPww+OKMUpZU//OtmtV0izuLYhxZ2rPTSUzxPHAsq7uLcf/vGgWtoKMEES+CdH8k0JYS/w9BSZYErzccczEinA0QlqNn8E/JYbWj0OmoDVlfClc2Fd1cw9dZE0fO+QEv0ZZ2bXyg5RRmoci0j2HT1NgyfDwpoQYh4oB4am3NkrK+DwYMHlwAOsEYKMX/K2o+FsuW0nBx99eNL3mjRZtj+l1nxhInSTB12nTk4jj0DN/C9uhFUVk7J4FUTahkeOw9s9av0vFgTgGD4OWHV85VeHeOytw2SsGYiWIsKjKYvov98IC4IFRXUV8AVT495YBSR9sP3JiQLfRjApBsi6dB0lO7cDv5vPvJtd87+4oTjEB3i1A97sUtpxKeanr6KKgeBC/vjne/jl6x+RMecHExiaWjp/ez1UFV6hlkr4QtkglzuuCf26FyfHBBMzgJRIzd1WwWrXq7c53+k1fqXwra8uDvH7U/BWj4rGKZlwllC3dBUxbxVf/+fXeWnvSRxn8rOolPBocEGdYoLywrunK6TgC47DIuGAM0lfyoQM8Knvg54BoVOG4EHg1jxjSLlHbfXOq525wpfFm91waKD0kSu6obNw5Xq6Uxr/5Wdvsr+1t8R3nDx8OlzSAA+sVlvZArgTjXszAbxGSi3bE6EgmW58WtK9EK74DSC50fXs5eQtj6aMPBc3zHyrl0XcUoEV/anSG26khOrmxZTX1vHG/lP85JX9hGPJ0t50CggacHWT8p0UkKwh4POGybVSqPjCa14pzAQFGUAToFnw6uVsBB4EFuU6T6DMux9vnrmRZzSOR6EtPntWO91jUFHXiOEP8k/P72V/S++EeQSziSov3LxERUgVwHoBD+g2Sw0L+hoLXzMvA+x4RmKrdT+E4DZgR67zHKksancsK455dzQ649CXnMJWpQgoq63HGwjQNxDnsd8cZmAeSQGA5jK4ZyUsDI7ES+bAnQhuSQXxNrfATQWWgtxj6yp+mQxI2OrO/nHnZl26d62ElZXFf9lwWrlKZy14XYK/vALD6wUBT717jO5IfJZuPjkIYH0V3LlCeVHzkNaP5NOeDOfZUoWU5UNOBrjnEdBN8PhYgOCTwJpc5xmaWpPOryuOxn8mEq5zZxbpj8cXQNOVmnO0LczRtjCWXUTjQxHg01XY3NULC552MXCLx6HK0pQ+lwvjGGDnTkm0EtIVaK6X755cP7SlsvBduXDC7cm0MRfrr9DEGKVj97EuEmlzDp6kMGr9SudaWlbQhfwpKbjwhJF/Eo1jgMduVoma3hjNSO7NlbEj3Ri+6xfBsiln8E0ePm32kj3IWgZtGymd4X8c7xwgPU8MQ2didaWigV/PO1mWAretsKl3xIhBbzTGDW9TJ/hTGFKJkJyKnwS2LoAL6ksj+rMIeQq+XEngWBZylHbVHYljWvNrCcgiax/YUltYIZSwxavnFgJjGGDbUxJbg4xBoxTcnytD15EqdPuqhaUP4Kz1q62PnEUOMNNJHMsalpmpjIUzmw8wRSwug2uaoM6flwkakdyWtqiTcrwUGCcBpIMGbAKuz3U1IRTXnVMzCy8XgvpAQe4uLgQko4NYmfTw1kPXtHkXPXQmttSp2MoCw3Q7sLYmRwDMMANc53qQNEGtkNyed/aH4Ly62YnbX1SmvIqzpQcIAYlIGCudGv5fyO9Bm+ccUONTO7H6/FJgIYId4RhVkrFSYHhopYR714CEZQhuyXezLbXKQzUb8GoqCbRhlqSAmTKJhfuUBHCJXhH0ok8x73sucG6NGqu84yS5C0mTPEOd0QDu+rnEo8HPjlImBB8HFpz5e0dCc0hx2myma51fB+srHUSJVUGhQaS7nXikf0yZkaUNlfg88z9NqdbvSoH8k2W1gK2azhjNTQN49C5V206T1LjFGsZBotb9TYXt0EVHuQc+1iRZFJIllQJSQv/pkyQHI6OyNCTrFtfhL5Z3q8TYUqeshPnGScKd0qFKSrg+u+QDbH8ONIEhNc51q3GNgSOVlrmxevaTOFI2tCU0knbpFAGhQaSzjf7TLdhmZlgB9HkN1jTXnBUSAJQOsKEayr15FcIrpWRZKjOyJTTu+rkkpirdlQHbcgV4OlIpY+tnae3HDf3+MAyvdMD7vYKB9JRLsEwOAqyMScfhA0R7u0asgBK2rGxkYc08LkiQA+uqlaJ+KJLTRlOO4Bqvj30C4gBGIAkDleAxKZeCbbku6tWVx6/UxRmk6wHcF4b3++DooMr0ydglIr4713tOHKH35FGkbbkVHdWacNula6irDJb2pYuM1RXKOns4kvd9bxSS7wPx656UGL314LUxpGADsOzMHzhSuR4no/nbUmXrRDPqM+VAxnXoOBLSzli7te2o7+KWivrtSanPaEbF/5vOtIovTRpCg3B7G6f27SYZGxxFfFjaWMXHtyyjPFCESlOzCK+ufDS7elUgTY6xO9+RNGdsug0NabiFGfzAlbmifbJ7/42jGCBpqVy800Mqbr0roYiXsBTRbLfWniOVcpUlusNYq550r5+tz5dxU7qypddKufsSAuLhMKc+eI9IZ9vYL6XDZ67fxNrmWdZ4i4RzatSOrS+V8+uABpcGdA4CyWxuph+45swkG4nKq1tcpv7+dYcSz0cHVTqWaSuime4xWvsU4/4oDDGq7l6pIQQkBiOc2P0buk8cRjrOqLVfsnXDYm6/bC2VofmTLDIVLClTDLAvnPv10bhawo+BpFGeQAz5qXXUDmDc8Hs1pYy916vEcspWa7Icc0WFs8BeAkA8MsDxXW/QefiAa/cfUfyqywP83q0XsXFp/Vw/5oywtExlRg+mx00qgWSrbhPsWMiAEQvhATYjx2f4CFSFzJNRJaZHV7M4S2g9BtJxiHS3c/zdN+hva0U69pjRMQyNP7zjEnZctBKPPpuBaMXHsnJVRDOSzkmrekdnxcJeugypumxckI+mUkLWGy5yfCmRZ4gD4RZcnj8sIqVDJpmk6+hBWj94j2R0cMTnPwqfuW4Tn772XKpC87CQwBSxrFz5CE7k/lpHcoGUvGcg8ACbkBPEXkqJ49g4toOUDraZIZNMYKaS2JYFSISmY3h9ePx+vL4AQtPUIQRCqCrNQmizkn8npUTaNmYmTbi9lVMf7mKwuxPHtsfFGmlCcPvla/mD2y9maUMJghvnANU+lV/o0XJaBoUUbAY8BhIvsC6vBHBs7EwGc2iQ/vZT9LW3EQv3kE7EkXZWNpyhEQilaXj8fgIVlQQqqglWVBGorCJYVYM/VI6m62i6rhhiFKNMF9JxkI6D49jYlkUqGqGn5Rg9J48SH+hHOjYyh1/fo2vcecU6/uT+K9mwpG6u6VZULCtXpvTIeD1AA9YLicfQJAsc1VBpvIS3TQZOHefY+7sY7OnEsS0l9kcX4C8Ay0yTGooy0NHmMoWKtzM8HoKV1QSrawhV1rpMUoUvVIZuGCCyUmOU5Biu+y8VIaXEcYlu2ybJwQjxgX5ifT1EutpJRAcUU7jnjn0xNSBVZX7uu2Yjf3jHJaxcOItmzllCQ0A57gbG6wECWKk7BAxHzf5x3g6hQaSrm/2vvUwimsOsNEkmkBIQSk/Inp2xLTKpJJGeTvfB3OALw8AXKsMbDOHx+TF8fjw+H4YvgKbrShqZJlYmjZlOkR4aIp2IkU7ElWiX2RqF+b0hAH6fwaqmar540wU8eO25lJ1lxp7Jot6vtvF5RiNo6ywxhGBZviIbZjqtiC8dRSQpEZqGz6MT8HnwenQ8uo6hi+GgCUdKTNvByh6WQ9q0SZnWyGI04mxDCoYpY5kZrEiYeCT3BnZaGGZUQSjgoam2nOvPW84XdpzP5hUzbkYyr1EXUAyQB5oULDOkZAkiZ2gYmqZRUdeIcM2xHh1qy3xsaK7i3CXVrFxQQV15gIqgD49HRyBImRYDQykGYkkG4mkGYknaemOc6h2kP5YkkTZJpi3iaZNEylQh1/YoQ8zo1hxTRZbY2U8hCAW8VJf5aa6r4PINi7jryvVcsrZpXhSCKDWqvGoJyPOmQkqWGlKwKF/p2trFy7n0ns8hrQwBHWqCOosrPCyrUJamxqDSNis8k2vOMBhP09ozSEv3ICe7IhzvCtPSNUjvYIK4ywzZz0TaxDLtSUeEah6dgNcg5PdS5vdSHvTSUBVk07IGtq5r5opzltBYPelmJP9mUOtXxjwrV0S4YJEhBHXI/HYdoWkIr5800JGGjh5VqcNxM1azbuKNVervBcH88YKVIR+bljewaflY0RuJpznVM8jp3ijtfTHa+qJ0hIeUxEiZZCybtGlj2c7w+q5pAkPX8Bo6QZ9BbUWQxuoQS+orWdZYxaqF1axsqj7rDTozRbVPhY+b1nhFUEjqDSGpy6cDnGnuzXbUynZozNhwNKJcj08J1cjhwvqRuv51k7SnVIV8VOVgDFwlMppIE02kSaTN4cINhq4R9HkoC3jPWpv9bCBk5A2qFQhqDKlqzIxjAF06BElhGDqW8JJGDBdgHM0ZQgw3x+TgAOwPq+3HBfVwUT2sqVRSYboQQkmO/0/k6SHkcRlgfFVqgaTaAMaTR4CVTBA5vQ8nnSCjB0kIHyJYQVVtHb7ySqQmcJyxzJD13fen4bnT8JtuJREuaoBzq1XA4tkGWypDSsxUxaqya6mhQZmhdJ/5XOvYp6vIoDxVyUPKEijGfieAoWSKfR8cYfD0STUNNY1QZRX1zc2Eahvx1zRQ1diENxhUivcZrmBdqEF7uV15Erc2qHSyTbVKaZzPsKSKdWiNuc2gksqYkrCUCxzUjqjKq5i6OaSSWLIOmPkEo0BzCgmerC8gJwSAYQxvyeLRQeKRARAHCVbXULtoKXVLVlCzeDnegJ8z/StZRhgyVX38D/pVU4grGlXQwnxzH1sOHBlU4WgHBuDYoCK8HOXqHmXCGO5y4tVUzMS6athco1rd1M4Tf5Ku5d1RCwG+vGYCKSWW44DjgOZeRQjQldEwEQmTCPfRd+okdUtXsmDFGmqal6F79HE7t2ygR08SnmhVTZWuWghXNqqt5HxARwJe71QlaI9FlYKrT5SdPBJGQEtMNYx6twcurIOPNStpN997IOir7t/5VcT4ULCQIVkTTBMQGQYTGcyUmyOfjddylwUrnSLa00m0v4d0fIhARRWeQO7FPvvTvpTaOXS6/XMaA2qw5wof9qtClC+0KUbAlVxToV3WWJawFCMcjyoJ0RRU6/BcoTUGu3uVFD5DEkgJffqqB3b+kRsKPvy1I2FBucGnz6/j9guauWLjYlYvrkNoGn3RpGKGbCEF98jEhxjs7SIe6cfjCxCsrFbFFvIMlunAqbgSs/3pkRavswlHKpvGj46qDl/ZINSZTNrsIIfTiglMBxaXz10PpJMxtaTlYgABvfqqB3b+PlA2mgEkUOEVXL3Ey9ZllWxavoBL1jaxdV0zF61toqLcT2d4iHg8PaqBrkBKm8RAmFh/D45lUl67AE3Pzf5ZaRDNqIFqiSmNuylUvBqDE+GdHvjnI3A027uniOI6Kw1aYspotrwc/HPABIcjirmT1rj3cySc1lc9sPMhoPbMXULAgI016sEBfB6DhTVlbF6xgIvWLOSStc2EAl5ae6IkkxlXS3KlQWKIWF8PmWSCyoaF6J78ar8QivDdCRVs2puCBn/ppcH+MPzwqCK+KFGImybU1vHUkJIAKypmt+IJqMDQfWEVon/GO0oBB/VVn9p5r1v/b+TRhIovX1uljjNREfSxZlEtF61p4vxVjcRSGVp7o9hZp44Q2GaGoXAfqaFBKhuaMHz5KZoVInELWoeURNCFkgalGLDOBDx6Qq2NlDi+UaiWuXQm1PssnuVEo919ykCXGc8ADvC+vvL+nZ8QqgrYmKHWhWrOvLlAaHx5wMva5lou37CYuoogB0/3MZRIjywJjk08EiY+0E/lgiY8/sKWoKw0yCqJfUmVlFKMLuBZmI5KN3uyVe33Z0NJ11ybiOnAqkrV4n628GonHInkjAmwpeB1fdWndl4uVNuX4cVauBawBQG4bIJKk0IIqsv8bF7RwOYVCzjRFaEzPDSSYe04JF37QXXTIjy+whvkLEHillISD0eUFr0wWBxpcDyqZn9nYpbtEEItc4tCiglmyxv97CklVXPczxLwuL7q/p0bBXzszKwgy80IvrppcgPl8xisaKziqnMWM5QyOdoeHi6uJKUkFRskMRihumkxhnfiBV4I9Qz9Kdg/oHSD5tDMZk/GUU2mXmibfSOUQLWWT6QtVldCjb/0DxDJKEtstl3tGbAE/EBf/amdTW4NmTEMIEeVHpls/V9NE9RVBrl0/SIQ8MGJnuESa1JKkrFBktEItYuWFlQMRw8aqD4BrUNKcQsayng0HWnQEYdnTqm0trmwQmoCehIOK0ImKys1tBI/RNuQYvj+3JnVGSn5W33lvTs1twfAuLlV5lGlR6bqxAn5PVy4eiFVZX52H+0kmbYguxzEomRSSWoXL0PTJmchyS5JA2n4IKykweKQYsypiNIjg/Crk7O39ueEpnHwSCtrqgQLq0rrHTs8qCyTMTPnOA0aNn+hCY0eBD25IjwTlmrUMB1Uhnz81vYt/PcvXE9DVWj4AWwzQ9exjzi5520cObX6e9K1G7zUBt/eA691Kl1hMjFDGUfNiGhmbrOaNAEtQ4LnPmynP5oo6b263V6KOd7XkXDM1klqQAbJoTMZQAiVC9gSm/4DlPm93HnFOv7ioY9TVzFi9DdTSdoO7KX94AdTLgIoXE3+5BD8z/3qOOna7gshbirP3lyHAkogVF3Lj187yocnukt6r9Yh1XAqxztLAYcQmJoUmFLwgbsvHIZwJcDpoYkHtxCCPg+fvHI93/7sNdSWj4i81FCU1r3v0t/WOr2BlIq73+iEnbuUaO9N5m8qlbTU0jHnkBAoK6c7luaJt4/QVyIpMJBW0tvMPb+khPclmJpwyAiH3fmC/MNppTTNBEGfh/uvOYdvfuoqqkZF9gyF+zj+3hsqDHyaM9Ny7QY/PgZ/8p7S8AfS4xnBdPKKw1mH7tEwPF6efOcYp3qiJblHS0w1nszzvpYGewyJqWk6FkoCjGNF4TLATJaBLEJ+Dw9eey5fuvUiQv6RHUCkq43j771BJpmctniWLoFPDcF3DsKfva9cu30pZYrFFW/zqeazbhgc7wizr6W3JK3qTsYgnE/fEfTYOicCCWzNcZDAALAvlx4QKRID4CqGX/rERdx3zUa8htoBOJZF78mjnPpgF/YMB0K6yt7+MPyPffCtPSoQpS2edy2cM2Qzmd7+qI3IULro1z+VVXhzrP9I3tFskkMhMNwewCngVSm47MziHklL+ZTDaWUXmCnqK4N8/d4r6AoP8cx7x9XMTCXpOLyPYHUNTWs2FMU6bzrKingkoqJzlpfnHZBZh2OBban4ir0nuokl0zRUFS8ypnVIKbyOzFkpTCJ4Vai2s6oNsC1JOfC625p8DDShZtCBgeINwNIFlXzrM9dw/urG4aJAiUg/pz58j0hXR1GJJN0AlHd7lfl3zukvxlYkP9kdKXpDigNhd8eT++uk4/B20lQ2Oq1pABwPlgYHgZNnnq0JZUo8OFDcuv0bl9az84GrWLrALW0pNCKd7bS8/zaJwcGiz9Q5J/yo50jGBjHdiuQ9kfiwoawYyNiqRmCeCmFI2C0EbT5DkVOL+0C3wIGolDyb66KmWybm9FDxBsLQNa7ZtJT/+MmtVJUH3AhLSW/LMU7t242ZzswLcV10CEhGI6oiuRBIW5LMFE8CHHWDa/JNVgFPCxgSwEu3CLRH7xZoDug2cQ1eAMb1qtaFWlcOFnEZwN0Z3H3VBj57wyY8Hh1QcQSdRw7Qdewgju3Mn6lbJAihtr+Z5Mimq5g1kA8NqCU7j5shiuA1209CulZ4DeDZWyAZxBKSA+5uYNxD96cUAwwVuX9SfWWQL950AdvOX+nqAxqp6ACn9u0m3HFqbjpHlRCW6RDr7x2WAAhB0FecRIlel0ax/Obu15G06KmRUdUAdj4MPhMsg7AUPJLrl8INo/qgv/iDsqa5hv9w51Y2r2pUwfmaTrS7g5b332Eo3PtvZikQAmJ93SSjkWETeCjgwecpTtjw3j4Vcl/AyfhLCRGA57erkxQD7BQ4BizZxZCAV4CuM3+pCaVZvt+n7OrFxqUbmvnybRexsKFC5SIIjb7W47TsfZdkLDZcxfVshtAg3NZKIhJW3CChqaasKAzQn4I9fcocnpMBJEeE5B1TJ1U2yuygjTqBtvNBSFqBJ/LdaG9/cbeEWXgNnVsvXcvnt20mGPCpWkCOQ+eRA7Qd2IuZTJ/VkkAISMaGGOg8jZlMuAYJycqmmqIsAR+GVX5D3tkveBRBh8+GzCh+G2aAF7YJpATToh/4FTDOSK0J5VJ9v0/Z1YuN6jI/D23bwie2rh4JLs2kOb1/Dx2H92NlzLOXCQT0njzGYFfHmMqka5prCM2QAcJpd/an8jJAp4Dn7jxCRJfwxK0jJ40TrIaBg2AfakcwDtKNpz9QxDI+o7F8QRW/d+vFXLZ+kdIHhEZ6KErL+2/Tc/KIMhefZUwgNBgKh+k+cZh0PDamLvF5KxqpCM7MxLq3T1UHLzAs/+IIDv9izXidegwDPH+zwBaQ0eiS8FNgnBcgqwu81qnWm1LgknVNfOnWC1mxqEbVD9I0EpEwJ957k/DpFuQ86+VbEAKsjEXn4f2E20e5viXUVodYt7gW7wx0gNNDqoh3f4HZL+HxeII+24Gnbx5fMHAMKgfBn8EG3gWezvlOQuX+7+ot2Ld22tCE4BNb1/DbO86jtjqkNsqaRqy/hyNv/5r+0y2qwvdZAAH0th6j4/A+7HR6zOzfuq6ZBTOoW5S2VWrb3gJrv4RfItkb8iNzLZ/jGOAX94JpQEbSATwCjNv4CVSc2Yvtyu1YCgR9Hn5r+3ncd/VGAn7PsM8g2tPJ4Tdfpq/1+LxnAqHBQEc7rXvfJREZUFnWWUjJjRetmlFLmiODKjyuQIf1FiF5LNRALw68cPP4s8ZvroSgOgxBiSM13nKZYBx0oWzOb3QqZigF6ioC/MHtF3P9+StGyroJQayvm8Nv/Su9LUfnLRMIDaK9PZzY/aZqSDF6+knJumX1XLRmIX7v9BIG+1PwSruy0Bbo3/wjBLsSvfmdITkXnwO/3MnyFhBp4kInBVwCjCukK6UyOy4qUylPpYhyri4PsHZRLR+d7qe1e3A4jyyTTDDY0wGOpLx+waQjjGcDQkCsv5dj77xGX8vxcWXpkZIv3XYxN1+8elodydI2vNYFj7Uot3eeYX9HCv4GhxPCA8/fmPusPPWjlH9AM0CXvA18n5Gq8WNedCANPz+u0rxLhfNWNfLwp69iy6oFY4JIE5EBTuz5DUfffhUzVSKNdBqIdHVw6I2X6W05puorjya+I7lk/WJ2XLhqWtq/RFn7fnnCTfnOfVpSCv7Z9LLX8ZwZ7TkWeafNsR8/zKa7d5LUMTVJGMFSYO2Z52WZIGGpRNLJJpFMBQJYXF/Jguoy9hzrIhxNjtgJLJOhcB/R3i4ClVX4g2VzVgXUsS16Th7l0BsvM9jdnmPmQzDo5St3X8r2C1eia1M3b7YPwfeOqEzqAhL3ESH4B2+GcNdSeOPy/CcWlJurHtipCFBOHyYWsBXIWVC/PaFKky8rV5nFxYYmBKsWVtNQHeL9491EYiMRj45tk4xG6G9rwcpkKK9tQNON2WMEKUnFY5zY8zYndr/p1lfOUZdLSj6/bQtf2HEeVWVTLyIUycC/nFR6V4HN10EEf2VLdqODkYGWHzyc9+SCpDry04dZdf9OZAYcm1ZNIwhcnut3toQTUZXEWaq0bl3TWLuolgXVIXYf72IwPsqoLaUqV9PbxUDHaTxeH4HySoQmSsYIUkqsTJquox9x5M2X6T15FDOdJ/bckXzsvOX80V1bWbd46n0JEhb8a7sS/WZ+kT4E/LXl4xEdbE3CSzcUfvcJ5+qxnzzM8rt24vNjAm1AM7DxzPOEG5B5eHCkZKxegnHXNY11i2tprq1gz9EuBhNjB9yxbVJDMfpOn2SgvRVN0/GFylS5GjFzZpCuj8JMp+g+foijv3mFtoMfkIwN4jh5glolnLOigW/cfyXXbFo65Xtm9/v/55BihAL4kSP5Wz1DxAzAizdM/K6TUkGFphx0jsMxIfgusBI4P9e54RR85yP4slthpBRM4DV07rx8LUGfwde+/wqH28JYo6yDUjqYqST9baeIdHXgL6ugbukK6petorxuAbphuB1K3C4l+ZjCbU4hpduNxLKJhXvoO3WCnpNHSUYHcSwrZ/+h0VizuIav33cFOy5aOeV3NR1l5//fH0243X5NCr6r6XQ4lhvsORnaTvZBdjwjSfngX6+F7U/zkICHXWmQ86JLy+HLm2BVRWmYAMCyHfa19PCH33mJtw+1k8rkmR5CoLmtaXzBEBUNjVTULyRUXUOgogpvIISmaWOsdFJKzFSSZCxKfKCPaF830e5OkkNRpGPjOM6EaW1CCNYvruXr913BPVdvGO6pMOn3c1SAx1/vU3l+Be52HPh69QA/62gCXyK30ScfrSaNC3ZJ6k+DJQgYHr4GfNktMDUOmlCFEP7dxtIygSMlbb1RvvK9V3hh9wnCseSEQUTZWa+WA4HQNHSPB8PjUWFploVtZYZj96Uc1apmMiFKUrWg27qumT++93K2XbByyl5M0yX+3x1QHtgCdw0L+It4Gf8tkMB6fvvUql1NmSzXPy4RBiCp1wR/CnwWyLmh1YQyEH1xg+o9XKrqX1JCPJXhhy/v4++e3MWJrgiptDn7SQCu4l8V8nPTJav46t2XTasBZdpW9v1/PKja8hYgfgL4Djo7hcOg6YGXrp/aO09rhG54arjBwHIh+K+5CkyMvkFDEH5nvSo2UcqiibYjOdIe5s8feYsX3z9BdyTuBpaWmBHcDiUBn4c1zTV8+rpNPHTD5mlt9ZKWcrd/95DSpwoQPwM8IiVfA9qEDs/tmPp7Tntktj01XGVhi4A/A27It6sQQI0fPr8WLm4ofXXtZMbi8d8c4fsvfsC+ll56InHVfaTYzYldHSDg97CsQXUb/8KO83L2PZgMBjOqqNOPjqrAzgIwgSeE4GvAEcdRrvzpYEajse1piabG4BIp+Daq1lBeQV/ugTuWw8ebVU+BUiOaSPPUu8d47K3D7GvpoXsgzsBQaqRH0VQZQo70IxK6Tl1lgCX1lVy2vpn7rtmoSuNME+1xeOY0PNuqSuIUgAU8h+SrwH6hwbM3Tp+MM54OO56SSAFScIWQfIMcBaeGxw+lB1y2QDHCysrZKaZsWg57jnXx8t6TvH2ondO9UfpjScKxJPFkZmzTqnwPrgsqQn6qy/zUVwZZ0VjNFecsYtsFK1nTXDP9Z3OUV/WR4yqyZ4L4Cgt4Tgi+geR9KeG5ac78LIoy/NueGX7qC4TkPwPbJjIyLa+Au1eoziLls9g/IG3aHDrdx4ctPRxs7aO1Z1AxQsokY9pkbBvHkRi6hq4J/F4PIb+HmjI/q5pr2LC4jk3LG1hfhC6jA2l4rwd+cXJSWVcm8KQQ7Mzmbsxk5mdRtPk3zASSLQK+CnwCyKsFSanKwd6wWPUPWF4xd6XVh1IZegcTxBIZ4ikTy7Hxezx4DY0qd8YXK3kDd9Yfi8Kv21UZt5g5oSs9CfxCwrc1wWGKRHyKnTO57elhSbBMwH8CHgDK850vpXrxNVVwwyLVXmY2dIO5REdCVe56qc0tKT8xESLAD3D4S6nRDvD8TcUjW9HnXJYJdGhw4EvA5/JZDLOwpVoGti6AqxcqE3JojsqrlwrRjMqq+nWnqlGcsCZlHDsJfNd2+Hvdzeh57pbikqwkQvfGpyVCQDpDwPDwAPDFfL6DLLItWJpDcMkCOK/23wYjDGZUSt2ePjXzu5OT7knwFvD3joefk8JEwAtFJj6lTJu//nGJ7sCzt8OOZ7geyedcg1FB64jjmhcWlcGWWtV2ZXNtcQtGzwZiptLq3+tVM7/LTQaeRNhcGvilFPxDSzOvL+4G3RnJ5Ss2Sqp2XbBLUhEFXwawWIbg08BDwIQ+0WzK9IKgqlZ6bo0yJy+Z5XLrU4EjVZT0RwMqbOtAWK35YnKEBzgKfA/JTx2DlrIYbDqgcjdLhZLr3dufclu6K70g6MA2BA8At00mHiHLCDV+WFqmIo7WVSmGmC+dufpSiuj7B+D4oCrQNJBRFrFJEt4EHgd+KHVeFCapLGVmus+fCLOy8brxaeU7cLLt4iWrEdwOPJgruCQXpFTKokdTO4XFZcrlvLxcMcWSstlrNZOyVeGsFvc4HVeWvO6EKsyoT83AuBf4gYSnvHAsIxhuxVoqsT8as7rz3u46kSwBHpuArXGxENwJ3AtM2m3mSHX4Daj2KulQ41NMsaxchaU1BqCqSG1n+tOKuB1xJeLb4yohM5xWZfTS9kjX1CmgE/ixgMeEYJctGY5vK+Y2byLMuunlliclXgkJDdIWeD3US9gq4G7glnxBp7kwunkjbjfzSq+KTA4ZamtZ5VPMUelV34cMFbTqEar7p3RrIFmO6quTMCFhK8KG08paFzdVNvSQqbZzWVv9FNb20QgDjyH4hSZ5J6MR9jjurHeKZ+CZLOYsz3bHM+6yAOghhJ2gCcmFSO4BdqCaWk8JcsRBN2xg8eqqs6dXV5ZGQxvpCZglniPVczhSMYLlqPjGtK0+Rw+UmH5buX7gKeBRIdhd5qVrKK00fCnGJ23OFuY80Xr7sxJHA08GzAC6lmYBsBHBbUhuA5pmeg856o8Jo4VGjUqRBqcN+CWCJ5ActKDHACerI8z2jM/5vnMOKbn3ZxCpVvlHho5mOdRIhyUIrhZwF3DeRDaEeYQksAt4VEpeFxqnCDBAYiSKcDbX+UKYH08xCjtcp5KUUNUM4XZCaFRrknVIrgNuAlYDnmzHuTl+5GygYEbAESl4GngJyWEpGaipIBGOgXA1++lE7ZQS8+tpRuH6xyXSAc0HXhNsH7q0CTka5ZpkNZIrgGtcyVDmBqJoJWaKLLEd94hL2C3g1wLedDSOCMkQOnEsbCkhY6qs8JdvnZ9DPT+fajSk5D/+Jew7Vw25NwOmH106+AG/7lDhaJzjCC5EslnAOtf5pI9iiDMZY/R7izNCfeUZhzPqaAcOC8leBO8Jh/22RlRAShOkPGns9KhFar7N9lyY/084GlJFH934LGRzMS48AHs24rEFHqTa3WmSGilYIyXL3KTWZgn1QlIrBZUCQq4+YbgRzWnAQhJH0O+GWvdJwWkkLUhOSjW7+4GMkJhCYF5wAPPdjSM7iqdvBFHsJsQlxv8FGGAF+y1GcPQAAAAldEVYdGRhdGU6Y3JlYXRlADIwMjYtMDEtMTdUMjA6NDU6NTQrMDA6MDDY4dkAAAAAJXRFWHRkYXRlOm1vZGlmeQAyMDI2LTAxLTE3VDIwOjQ1OjU0KzAwOjAwqbxhvAAAACh0RVh0ZGF0ZTp0aW1lc3RhbXAAMjAyNi0wMS0xN1QyMDo0NTo1NCswMDowMP6pQGMAAAAZdEVYdFNvZnR3YXJlAHd3dy5pbmtzY2FwZS5vcmeb7jwaAAAAAElFTkSuQmCC",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "rhbk-operator",
                "resourceVersion": "19748",
                "uid": "fc3c2b56-0a5a-4f2c-abda-f0e74efa39a0"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"k8s.keycloak.org/v2alpha1\",\n    \"kind\": \"Keycloak\",\n    \"metadata\": {\n      \"name\": \"example-keycloak\",\n      \"labels\": {\n        \"app\": \"sso\"\n      }\n    },\n    \"spec\": {\n      \"instances\": 1,\n      \"hostname\": {\n        \"hostname\": \"example.org\"\n      },\n      \"http\": {\n        \"tlsSecret\": \"my-tls-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"k8s.keycloak.org/v2alpha1\",\n    \"kind\": \"KeycloakRealmImport\",\n    \"metadata\": {\n      \"name\": \"example-keycloak-realm-import\",\n      \"labels\": {\n        \"app\": \"sso\"\n      }\n    },\n    \"spec\": {\n      \"keycloakCRName\": \"example-keycloak\",\n      \"realm\": {}\n    }\n  }\n]",
                    "capabilities": "Deep Insights",
                    "categories": "Security",
                    "certified": "false",
                    "containerImage": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                    "createdAt": "2025-03-26T02:27:51Z",
                    "description": "An Operator for installing and managing Keycloak",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "false",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "rhbk-operator",
                    "olm.operatorNamespace": "rhbk-operator",
                    "olm.targetNamespaces": "tsf-keycloak",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"k8s.keycloak.org\",\"kind\":\"Keycloak\",\"version\":\"v2alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"k8s.keycloak.org\",\"kind\":\"KeycloakRealmImport\",\"version\":\"v2alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhbk-operator\",\"version\":\"24.0.11-opr.1\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "repository": "https://github.com/keycloak/keycloak",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:37Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported",
                    "operators.coreos.com/rhbk-operator.rhbk-operator": ""
                },
                "name": "rhbk-operator.v24.0.11-opr.1",
                "namespace": "rhbk-operator",
                "resourceVersion": "17306",
                "uid": "ad0736b8-d2c0-4943-8a21-4409791f3e4e"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents a Keycloak Realm Import",
                            "displayName": "KeycloakRealmImport",
                            "kind": "KeycloakRealmImport",
                            "name": "keycloakrealmimports.k8s.keycloak.org",
                            "version": "v2alpha1"
                        },
                        {
                            "description": "Represents a Keycloak Instance",
                            "displayName": "Keycloak",
                            "kind": "Keycloak",
                            "name": "keycloaks.k8s.keycloak.org",
                            "version": "v2alpha1"
                        }
                    ]
                },
                "description": "A Kubernetes Operator based on the Operator SDK for installing and managing Keycloak.\n\nKeycloak lets you add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box.\n\nThe operator can deploy and manage Keycloak instances on Kubernetes and OpenShift.\nThe following features are supported:\n\n* Install Keycloak to a namespace\n* Import Keycloak Realms\n",
                "displayName": "Keycloak Operator",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhbk-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "name": "rhbk-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "rhbk-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "name": "rhbk-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "RELATED_IMAGE_KEYCLOAK",
                                                            "value": "registry.redhat.io/rhbk/keycloak-rhel9@sha256:d339ecf788d1681ba9945a2ea63ca675caec863ec75f497ef916103f4c898003"
                                                        },
                                                        {
                                                            "name": "QUARKUS_OPERATOR_SDK_CONTROLLERS_KEYCLOAKREALMIMPORTCONTROLLER_NAMESPACES",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "QUARKUS_OPERATOR_SDK_CONTROLLERS_KEYCLOAKCONTROLLER_NAMESPACES",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "rhbk-operator"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                                                    "imagePullPolicy": "Always",
                                                    "name": "rhbk-operator",
                                                    "resources": {}
                                                }
                                            ],
                                            "serviceAccountName": "rhbk-operator"
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets",
                                            "services"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "k8s.keycloak.org"
                                        ],
                                        "resources": [
                                            "keycloakrealmimports",
                                            "keycloakrealmimports/status",
                                            "keycloakrealmimports/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "k8s.keycloak.org"
                                        ],
                                        "resources": [
                                            "keycloaks",
                                            "keycloaks/status",
                                            "keycloaks/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "services"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "delete",
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhbk-operator"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": false,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "Keycloak",
                    "Identity",
                    "Access"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://www.keycloak.org/guides#operator"
                    },
                    {
                        "name": "Keycloak",
                        "url": "https://www.keycloak.org/"
                    },
                    {
                        "name": "Keycloak Discourse",
                        "url": "https://keycloak.discourse.group/"
                    }
                ],
                "maintainers": [
                    {
                        "email": "keycloak-dev@googlegroups.com",
                        "name": "Keycloak DEV mailing list"
                    }
                ],
                "maturity": "stable",
                "nativeAPIs": [
                    {
                        "group": "",
                        "kind": "Secret",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Secret",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "version": "v1"
                    },
                    {
                        "group": "apps",
                        "kind": "StatefulSet",
                        "version": "v1"
                    },
                    {
                        "group": "networking.k8s.io",
                        "kind": "Ingress",
                        "version": "v1"
                    }
                ],
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                        "name": "keycloak-rhel9-operator-ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a-annotation"
                    },
                    {
                        "image": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                        "name": "rhbk-operator"
                    },
                    {
                        "image": "registry.redhat.io/rhbk/keycloak-rhel9@sha256:d339ecf788d1681ba9945a2ea63ca675caec863ec75f497ef916103f4c898003",
                        "name": "keycloak"
                    }
                ],
                "version": "24.0.11-opr.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "installing: waiting for deployment rhbk-operator to become ready: deployment \"rhbk-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "installing: waiting for deployment rhbk-operator to become ready: deployment \"rhbk-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "installing: waiting for deployment rhbk-operator to become ready: deployment \"rhbk-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:49Z",
                        "lastUpdateTime": "2026-04-03T00:11:49Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:49Z",
                        "lastUpdateTime": "2026-04-03T00:11:49Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:49Z",
                        "lastUpdateTime": "2026-04-03T00:11:49Z",
                        "message": "installing: waiting for deployment rhbk-operator to become ready: waiting for spec update of deployment \"rhbk-operator\" to be observed...",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:50Z",
                        "lastUpdateTime": "2026-04-03T00:11:50Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:50Z",
                "lastUpdateTime": "2026-04-03T00:11:50Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "keycloakrealmimports.k8s.keycloak.org",
                        "status": "Present",
                        "uuid": "e252e10c-3adb-46f3-b1f4-84252173398f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "keycloaks.k8s.keycloak.org",
                        "status": "Present",
                        "uuid": "cfef7027-acd3-4d7f-8c0b-38cac9ec72b9",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Secret",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Secret",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "apps",
                        "kind": "StatefulSet",
                        "message": "Native API exists",
                        "name": "v1.apps",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "networking.k8s.io",
                        "kind": "Ingress",
                        "message": "Native API exists",
                        "name": "v1.networking.k8s.io",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhbk-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "rhbk-operator",
                "resourceVersion": "29179",
                "uid": "e3ed14a1-5b2a-4a7c-8f81-6d6ebfb97921"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "rhtpa-operator",
                "resourceVersion": "17437",
                "uid": "f8f3d04d-7761-47dc-9a19-164a186c7ce3"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:45Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "rhtpa-operator",
                "resourceVersion": "19347",
                "uid": "7e168f08-7401-41fb-b5f7-4c1605bc5a09"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "rhtpa-operator",
                "resourceVersion": "19891",
                "uid": "0a4e541f-3667-49fc-be5a-ba2bdea6285b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "rhtpa-operator",
                "resourceVersion": "29085",
                "uid": "a8a28037-7ec8-4ce1-a7ee-63f4121506d6"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18890",
                "uid": "8a6f08ac-0d1b-410f-ad65-6ca0d7ded880"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "19253",
                "uid": "6e5d5e6b-5544-498a-9be1-6b39af58ff19"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:15Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "19789",
                "uid": "bd2e8083-d4f9-4a33-bcc5-55c37155ab83"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "29182",
                "uid": "a9de1f90-219c-49e9-9434-6c0ba111fb56"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "tsf-keycloak",
                "resourceVersion": "16956",
                "uid": "11345030-002e-432d-9645-6bf25fa9c633"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:48Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "tsf-keycloak",
                "resourceVersion": "19441",
                "uid": "43958b3d-adc2-445d-a682-187d18cb6fde"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "tsf-keycloak",
                "resourceVersion": "19987",
                "uid": "84500c3c-ae95-4045-9872-6152e7d4ee87"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"k8s.keycloak.org/v2alpha1\",\n    \"kind\": \"Keycloak\",\n    \"metadata\": {\n      \"name\": \"example-keycloak\",\n      \"labels\": {\n        \"app\": \"sso\"\n      }\n    },\n    \"spec\": {\n      \"instances\": 1,\n      \"hostname\": {\n        \"hostname\": \"example.org\"\n      },\n      \"http\": {\n        \"tlsSecret\": \"my-tls-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"k8s.keycloak.org/v2alpha1\",\n    \"kind\": \"KeycloakRealmImport\",\n    \"metadata\": {\n      \"name\": \"example-keycloak-realm-import\",\n      \"labels\": {\n        \"app\": \"sso\"\n      }\n    },\n    \"spec\": {\n      \"keycloakCRName\": \"example-keycloak\",\n      \"realm\": {}\n    }\n  }\n]",
                    "capabilities": "Deep Insights",
                    "categories": "Security",
                    "certified": "false",
                    "containerImage": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                    "createdAt": "2025-03-26T02:27:51Z",
                    "description": "An Operator for installing and managing Keycloak",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "false",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "rhbk-operator",
                    "olm.operatorNamespace": "rhbk-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"k8s.keycloak.org\",\"kind\":\"Keycloak\",\"version\":\"v2alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"k8s.keycloak.org\",\"kind\":\"KeycloakRealmImport\",\"version\":\"v2alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhbk-operator\",\"version\":\"24.0.11-opr.1\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "repository": "https://github.com/keycloak/keycloak",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:37Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "rhbk-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "rhbk-operator.v24.0.11-opr.1",
                "namespace": "tsf-keycloak",
                "resourceVersion": "17665",
                "uid": "82983f01-ce16-4b92-841b-2b900cf9972a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents a Keycloak Realm Import",
                            "displayName": "KeycloakRealmImport",
                            "kind": "KeycloakRealmImport",
                            "name": "keycloakrealmimports.k8s.keycloak.org",
                            "version": "v2alpha1"
                        },
                        {
                            "description": "Represents a Keycloak Instance",
                            "displayName": "Keycloak",
                            "kind": "Keycloak",
                            "name": "keycloaks.k8s.keycloak.org",
                            "version": "v2alpha1"
                        }
                    ]
                },
                "description": "A Kubernetes Operator based on the Operator SDK for installing and managing Keycloak.\n\nKeycloak lets you add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box.\n\nThe operator can deploy and manage Keycloak instances on Kubernetes and OpenShift.\nThe following features are supported:\n\n* Install Keycloak to a namespace\n* Import Keycloak Realms\n",
                "displayName": "Keycloak Operator",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhbk-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "name": "rhbk-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "rhbk-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "name": "rhbk-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "RELATED_IMAGE_KEYCLOAK",
                                                            "value": "registry.redhat.io/rhbk/keycloak-rhel9@sha256:d339ecf788d1681ba9945a2ea63ca675caec863ec75f497ef916103f4c898003"
                                                        },
                                                        {
                                                            "name": "QUARKUS_OPERATOR_SDK_CONTROLLERS_KEYCLOAKREALMIMPORTCONTROLLER_NAMESPACES",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "QUARKUS_OPERATOR_SDK_CONTROLLERS_KEYCLOAKCONTROLLER_NAMESPACES",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "rhbk-operator"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                                                    "imagePullPolicy": "Always",
                                                    "name": "rhbk-operator",
                                                    "resources": {}
                                                }
                                            ],
                                            "serviceAccountName": "rhbk-operator"
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets",
                                            "services"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "k8s.keycloak.org"
                                        ],
                                        "resources": [
                                            "keycloakrealmimports",
                                            "keycloakrealmimports/status",
                                            "keycloakrealmimports/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "k8s.keycloak.org"
                                        ],
                                        "resources": [
                                            "keycloaks",
                                            "keycloaks/status",
                                            "keycloaks/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "services"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "patch",
                                            "update",
                                            "delete",
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "delete",
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhbk-operator"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": false,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "Keycloak",
                    "Identity",
                    "Access"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://www.keycloak.org/guides#operator"
                    },
                    {
                        "name": "Keycloak",
                        "url": "https://www.keycloak.org/"
                    },
                    {
                        "name": "Keycloak Discourse",
                        "url": "https://keycloak.discourse.group/"
                    }
                ],
                "maintainers": [
                    {
                        "email": "keycloak-dev@googlegroups.com",
                        "name": "Keycloak DEV mailing list"
                    }
                ],
                "maturity": "stable",
                "nativeAPIs": [
                    {
                        "group": "",
                        "kind": "Secret",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Secret",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "version": "v1"
                    },
                    {
                        "group": "apps",
                        "kind": "StatefulSet",
                        "version": "v1"
                    },
                    {
                        "group": "networking.k8s.io",
                        "kind": "Ingress",
                        "version": "v1"
                    }
                ],
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                        "name": "keycloak-rhel9-operator-ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a-annotation"
                    },
                    {
                        "image": "registry.redhat.io/rhbk/keycloak-rhel9-operator@sha256:ee815bf36c438e81b9553f0359a7725f0b3f633a5143f04cc822ea865940801a",
                        "name": "rhbk-operator"
                    },
                    {
                        "image": "registry.redhat.io/rhbk/keycloak-rhel9@sha256:d339ecf788d1681ba9945a2ea63ca675caec863ec75f497ef916103f4c898003",
                        "name": "keycloak"
                    }
                ],
                "version": "24.0.11-opr.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:37Z",
                        "lastUpdateTime": "2026-04-03T00:11:37Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "installing: waiting for deployment rhbk-operator to become ready: deployment \"rhbk-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "installing: waiting for deployment rhbk-operator to become ready: deployment \"rhbk-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "installing: waiting for deployment rhbk-operator to become ready: deployment \"rhbk-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:49Z",
                        "lastUpdateTime": "2026-04-03T00:11:49Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:49Z",
                        "lastUpdateTime": "2026-04-03T00:11:49Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:49Z",
                        "lastUpdateTime": "2026-04-03T00:11:49Z",
                        "message": "installing: waiting for deployment rhbk-operator to become ready: waiting for spec update of deployment \"rhbk-operator\" to be observed...",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:50Z",
                        "lastUpdateTime": "2026-04-03T00:11:50Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:50Z",
                "lastUpdateTime": "2026-04-03T00:11:50Z",
                "message": "The operator is running in rhbk-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "keycloakrealmimports.k8s.keycloak.org",
                        "status": "Present",
                        "uuid": "e252e10c-3adb-46f3-b1f4-84252173398f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "keycloaks.k8s.keycloak.org",
                        "status": "Present",
                        "uuid": "cfef7027-acd3-4d7f-8c0b-38cac9ec72b9",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Secret",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Secret",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "",
                        "kind": "Service",
                        "message": "Native API exists",
                        "name": "v1.",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "apps",
                        "kind": "StatefulSet",
                        "message": "Native API exists",
                        "name": "v1.apps",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "group": "networking.k8s.io",
                        "kind": "Ingress",
                        "message": "Native API exists",
                        "name": "v1.networking.k8s.io",
                        "status": "Present",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhbk-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:01Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "tsf-keycloak",
                "resourceVersion": "29134",
                "uid": "0804bade-e00c-4065-b8c6-3c425e708e15"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:42Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "tsf-tas",
                "resourceVersion": "17056",
                "uid": "a2b87810-bd40-4011-ac3f-cf3bce214453"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:48Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "tsf-tas",
                "resourceVersion": "19456",
                "uid": "a56b09bf-e52d-4673-a003-6f0dfb9643cc"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:05Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "tsf-tas",
                "resourceVersion": "20003",
                "uid": "050c15e8-2d91-49f1-9b41-293205ee200b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:01Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "tsf-tas",
                "resourceVersion": "29149",
                "uid": "133fe546-9a93-4ebe-9a61-c59e5110c14a"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:43Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "tsf-tpa",
                "resourceVersion": "17247",
                "uid": "90420b45-bc7e-4fc5-8557-9c5177ebfdc1"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAVQAAAC1CAYAAAAA/QcmAAARRElEQVR4nO3dTWgjaWLG8cfuj2n3eKbkpqGHkNmqueSwJJH6kLlkEtVcwkII1pLLHhYkJ7AJ5OC6DCQnqZlDAlmwOqfksLgMCSTsBMuBXSZLQGXYHLJM4nKyl82lS9tZyGZMS/J0tz1utyuHXgvbbX2/Ukny/weCGUuqel1tPXq/ay6O41gAgKHNJ10AAJgVBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgAoAhBCoAGEKgYqxehqFOoqiv13/huqrPzak+N6cvXFfPPU/HQTCyMgKDmovjOE66EJhtcaOhg1JJR76vuNmUJM1Zlm4WCrrleZp3nEvfdxqmp++5aM6ydCOX081cTjdyuVEVH+gZgYqR289k9HJ3t+3zN/N53fI8XctkWj/7slzWQanUNkwvmrdt3cjlOgY0MGoEKkbqoFTS4YMHPb123rY17zg6iSKd1GoDn/N6Nqs3CgXdLBQGPgYwCAIVI3MSRWq+915i55+37Va3wlwqlVg5cHUwKIWR+dL3Ez3/Sa2mwwcP1HScV90HjUai5cHso4aKkWk6zlBNd9PmLEtveJ4WSqWki4IZRaBiJF6Gofbv30+6GJeat20tVirnBsEAE2jyYyQOy+Wki9DWSa2m/fv3dZRwlwRmDzVUjEQjlep5ylOS3qpWdd11ky4GZgQ1VBj3olKZijCVpGdMrYJBBCqMO6pUki5Cz05qNb0Mw6SLgRlBoMK4F1MUqNJ0fQFgshGoMOrsev1pwUYrMIVAhVHTWNujyQ9TGOWHMXGjocbSUtLFGMjbOzvMS8XQqKHCmGnrOz2LZj9MIFBhzLPvfjfpIgzsmGY/DKDJDyOiKNLtr35VNw4Oki7KQOZtW1YfdxIALkMNFUb4vq+DmzeTLsbATmq1vm7NAlyGQIURvu/r46OjpIsxFEb7MSwCFQM7iSIdB4H+ZW1NtVpN3zk40E/u3k26WAN7wcAUhnQ96QJg8r0MQx0HgY5/ccfS4+3tc88fvvtu67+/trenf71zR7/05Mm4izk0RvoxLAalcKmXYajDcrmnjU4+WljQd84MRlnS1IbqEh8HDIEmP845iSJ94bqv9gvd2OhpGelPLozsNyX95pMnemxZIyrl6FBLxTAIVLS8qFS0n8m81qQfRFNSutnUD+7cGb5gY0Q/KoZBoELSq5rZ069/faCNTX67w3LTbzx5om/dvq2jW7eGKd7YPPv006SLgClGoELScBstf/PatY7Pf/L8ud4/PNSPpmAGwOd7e0kXAVOMQIWOfH+ou5O+s7enD7q85qd6NQPgW7dva3+C+1bv/OxnCpmPigERqDCy5d7fWpZ6iclPnj9XutnU31iWXiwsDH1e0/7v3j0F9KNiQAQqjKwQervZ1D/02KRvSvqzZlO/cnAwccH6b8+e6cff/77iRiPpomAKEagYqrl/1vt7e/r7Pkb1zwbrRwsLarz1lpFyDOr49m19vLene599pqbj6KBUIljRFyb2Q/W5OaPH+8GdO/rGgJP6P5Dk3bun39rfH/vOVacLFD6Q9E+/+NmcZel2uayb3B0VPSBQoS9c18jc07OGCdVTvyvpj999V7/x+ee6eXhopmCX2LcsfbPZ1A/P/Oxiya9ns3rT9zXvOCMrB6YfTX6M5NYfv/PkiX58546+MsQxvifp9x4/1juHh8pK+vbSkv7jnXeMzRL437t39dHCgpwLYSpJe/funfv/4+1t7WcyU31XAoweNVToZRhq//79kRz7xcKC/mRuTp88f2782B9I+oqkD2xbbx4f69clXbvefr+f2smJHs/P63u1mn6oV3247fynbeuX2/Qtv7m+ThcALkWgQtJomv1n/ejuXX1rb08/HdkZzOrWWUGo4jI0+SFJWiiVRnr89/f29Nnt2/rzHuerJqnbIgVJerayoiPfH3VRMGWooaLlaS6nF1tbIz/PvmXp46Ojc1v+TZJP797V+z0uQeX20ziLQEVL3GhoP5MxNi+1m6dLS/q7kxP9RbPZsT9znP5wYUF/2UfQc3M/nEWTHy1zqZQWKxXNjWmt/WK9rj9qNvXfCwv65N49/dpYztpev2EqvVoUcTDi7hJMD2qoeM2R7+vZykoi5366tKR/vnZNf7W3p/8a0zktSd++e1e/P+BOU3OWpRQrqiACFW0kGaqnni4taXdxUX/9+HHXaU6DsCT9qWXpD46Ohl6Vxag/JAIVHRz5vp573kCbTo/C06UlRYuL+vejI/3jz3+uptR3LfYDvdoQ+2uLi/rVx4+Nle1mPq83GfW/8ghUdPQyDPWF605MqLbzP7bd8fnU/r4W6/WRnf9aOq232Uf1yiNQ0dVJFOlpLqeXu7tJF2WiccdUMMqPruYdR28FgW7m80kXBZhoBCp6MpdK6U3f1+Lm5timVU0TrgkkAhV9upHLyYoi3VheTrooE4XVUpAIVAzgdAHA4uam5rsMBl0VBCokAhVDuJHL6e0w1K1i8co3eW+4btJFwARglB9GnESRDkolHW1sJF2UsWOlFE5RQ4UR846jN31f1qNHV242wBuel3QRMCGooWIkrkqNdd629XYYai6VSroomAAEKkbqJIr0pe/ry3J54ldbDYL9UHEWgYqxOfJ9HZbLM7Piig1RcBGBirE7iSIdlst6UamMbTNr0whTXIZARaJeVCo6qlT0olKZii6BedvWYqVCMx+XIlAxMV6Gob70fR0HwcR1C8xZlt7wvJHfzBDTjUDFRDqJIh0HgV4EgY6DILGugXnb1s1CQbc8j5F8dEWgYiqcRJFehqGOw/BVDTYMR9ZFcC2d1nXX1RuFAk179IVAxVQ7DoJXYRtFihsNvTyzyfPx9nbb911Lp1s1zuuuq/lUStcyGV1nCSmGQKACgCEsPQUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADCEQAUAQwhUADDketIFAM4Kw/DcIwiCpIsE9IxAHSFTYeA4jhzHMXKsSRNFkXzfVxAECsNQzQF3kIqiSFEUtX1+kGsYhqEaHW4PnclklJrALf3CMJTjOBNZtpkXY2QkGXtYlhUvLy/Hm5ubSf9aRhWLxY6/t6njFIvFvsuWzWY7HrNarfZ9TNPq9Xq8ubkZF4vFOJvNxpZlTUzZriJqqFOi2Wxqa2tLW1tbSqfT8n1fGfbqvLLCMFQul1NtSu/JNasYlJpCu7u7un//vnzfT7ooSEij0SBMJxCBOsVWVlYIVWCCEKhTzvO8joMxAMaHQJ1yzWZTJe7ECUwEBqUSVCwW2z7XaDRaczG7TSXa2NhQuVxmmgyQMAI1Qb3ULBuNhgqFgra2tjq+rlKpqFAodDxOpVJpzffcPXPf+3Q6LcdxlMvllMvljATz2XNd5LqucrnczM9SOF2YEIahoii69Msxm80qk8m0rkk7F/9WunXznM7t7eVYMCjpeVuzTF3mlvaqXq/Htm0PNM+yXq/HxWKxNT+x28OyrLhYLMb1er3v37ffc9m23XWuZ68mZR7qzs5OnM/nu/57tbse6+vrl5al32OZuKboH1d3hEz+Ya+urvYdGDs7O3E6nR7oQ2fbdryzs9Nz+XZ2dgYKEVPXKOlArVarxn7/fD7/WlkI1OnAoNSU6LcZHoahXNc917TvR61Wk+u6lzbZL/J9X/fv37/y8yJN/f4bGxsdu28wuehDnRL9zDc9DdNB18WfajabrVBttw4+CAKtrKwMdZ5xiKKo770VOq3jv8h1XWWzWW1vb/dZssudhqrrukaOhzFJuoo8y2So6ZXP57se6+wa/0Gb+e0e2Wz20nLV6/We+0sHffSqW5N/FI+LfajVatXo8ZeXl3v+WxrFNUX/qKEmqNto62mtqltT0rKs1ghxqVTq2szP5/NyXVeO47R2e+pUs9re3lalUnltFNrzvJ5qwbZtnzvfxVkGs6JdLfV0JN9xHGUyGQVBoCiKtLGx0fF4Z2d2ZLPZc881Go2O1zCdTjONLglJJ/os05hqSmcHXDrVGC3LarsL0fr6esdzXKylPnr0qGu5bNtue75qtdp10KefP89JqKHGcRxvbm62rtf6+nrH2RI7Oztda/idrt8g78NoEagjNI4PtW3brQ/t6Ye53WNtba1jedfW1jq+/9GjRz2/Np1O9zT1qlv3RK8mJVDjOD53nbrp9kVGoE4XmvxTzLIsVSqVVtOuUql0fO1pc7OdTCYjy7LaNuODIGiNPnc6l/RqEK2XJucsNkv72ch6VjcOv6oI1Cll27Yqlcq51UadVs80m019+OGHQ53z7BSqTn2uy8vLM78KqpsoilSpVFqrpC7DCP7sIVCnjGVZ8jxPnue9VrvrZc7oMHo9/lUOijAM5XleT9OnTE2xwuQgUKdMs9lUoVC4tKk87LxTUyaxdprP5/ueLO95Xl+zEXzfn4o5uRgdAjVBcRy/9rNGoyHHcTqGY6lUunSif6f+z3E6XVgwSRzH6btM/fTvVioVwhTshzppUqmUPM/r+JqNjY1LB5cmpWZ4FW/93O3fDFcDgTqBPM+TZVkdX3PZooBugfro0SPFr6bKDfQ4G5QXJ5qftbW1NfL+3EkShmHHxRf5fF7ValX1el1xHGtnZ0fValVra2uybXuMJcWoEagTqJda6vb29ms1wW5N2lwu19P69F5eM85zTbpOXx7FYlG+78t13VYXwun+p57njWza1Cxc12lEoE6oXmqpFwdZcrlcxxrP7u6uXNdtO42n0Wi0PuTdapjdBnhqtZocx2m7qUsQBMpkMjOxBLXTdLWkumG4eWMyCNQJ1UsttVarvfbB6fae3d1dvffee8rlciqXywqCQOVyWYVCQY7j6OHDh61dpjp9KB3HUT6f73iuZrOplZUVpVKpVo0sl8vJcRx9+OGHMxGmUufJ+aVSqW1tMYqikd1gcWtrS47jyPM8lUoleZ4n13UnbrBw5ox9bdYVoi5LF3vRbdNiy7JeW+JpcrepdjvIx/F07TY1yg2md3Z2Or7Otu14dXU1LhaLcbFYjFdXV3v+N2q3hLRerw90PdvtHAYzqKFOuG47UjWbTZXL5XM/q1QqXbsLerWystK2eZ9KpWha6lWzPp1Ot32+Vqvp4cOHevDggR48eKCHDx8OXTtPpVIdBwaRDAJ1whUKha4jweVy+Vyz0nEcBUFgLFQrlUrbpmkul9P6+rqR80yzi19q48DN9iYPgToFeqmlXuw7zWQyiqJo6FpMNptVFEUd+wkLhYKq1aqxAJ9GruuO/YvFdV2trq6O9ZzojECdAr3UUjc2Nl6rRaZSKQVBoPX19b7nO6bTaVWrVQVB0NOKodPZA8VisedgXV1dnalAKBQK2tzc7PlaW5al5eXloc5ZLpe1trZ2pb/MJslcHF+y/hFGdKtZ9tNkC4Kg6wqkbqO4YRjK932FYfjaPeJt224tz8zlckNN92k0Gq2dli5Ovzp7jtPA7/R79XqNuh1nkBFu3/c7jsKfzoxo994gCF67O0E2mz13DRqNRsd+6E7nOKvTNZfUumOA67oTs6JuFhGoAGAITX4AMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBDCFQAMIRABQBD/h+fh1Gb7+ZNngAAAABJRU5ErkJggg==",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:51Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "tsf-tpa",
                "resourceVersion": "19181",
                "uid": "c5442aab-2c1d-4a86-9aa8-6b13954da326"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:08Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "tsf-tpa",
                "resourceVersion": "19633",
                "uid": "6380b0fc-705b-4da4-9178-803af5d8484b"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:03Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "tsf-tpa",
                "resourceVersion": "29174",
                "uid": "bcd191a1-cf44-4c74-b7ab-2d023d5c1323"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtpa.io/v1\",\n    \"kind\": \"TrustedProfileAnalyzer\",\n    \"metadata\": {\n      \"name\": \"trustedprofileanalyzer-sample\"\n    },\n    \"spec\": {\n      \"appDomain\": \"change-me\",\n      \"collector\": {},\n      \"database\": {},\n      \"image\": {},\n      \"infrastructure\": {\n        \"port\": 9010\n      },\n      \"ingress\": {},\n      \"metrics\": {\n        \"enabled\": false\n      },\n      \"modules\": {\n        \"createDatabase\": {\n          \"enabled\": false,\n          \"image\": {}\n        },\n        \"createImporters\": {\n          \"enabled\": false,\n          \"image\": {},\n          \"importers\": {}\n        },\n        \"importer\": {\n          \"concurrency\": 1,\n          \"enabled\": true,\n          \"image\": {},\n          \"infrastructure\": {},\n          \"metrics\": {},\n          \"replicas\": 1,\n          \"resources\": {\n            \"requests\": {\n              \"cpu\": 1,\n              \"memory\": \"8Gi\"\n            }\n          },\n          \"rust\": {},\n          \"tracing\": {},\n          \"workingDirectory\": {\n            \"size\": \"32Gi\"\n          }\n        },\n        \"migrateDatabase\": {\n          \"enabled\": false,\n          \"image\": {}\n        },\n        \"server\": {\n          \"enabled\": true,\n          \"image\": {},\n          \"infrastructure\": {},\n          \"ingress\": {},\n          \"metrics\": {},\n          \"replicas\": 1,\n          \"resources\": {\n            \"requests\": {\n              \"cpu\": 1,\n              \"memory\": \"8Gi\"\n            }\n          },\n          \"rust\": {},\n          \"tracing\": {}\n        }\n      },\n      \"oidc\": {\n        \"clients\": {\n          \"cli\": {\n            \"clientSecret\": null\n          },\n          \"frontend\": {}\n        }\n      },\n      \"openshift\": {\n        \"useServiceCa\": true\n      },\n      \"partOf\": \"trustify\",\n      \"replicas\": 1,\n      \"rust\": {},\n      \"storage\": {},\n      \"tls\": {},\n      \"tracing\": {\n        \"enabled\": false\n      }\n    }\n  }\n]",
                    "capabilities": "Basic Install",
                    "createdAt": "2025-11-04T12:03:15Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "false",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "false",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "rhtpa-operator",
                    "olm.operatorNamespace": "tsf-tpa",
                    "olm.targetNamespaces": "tsf-tpa",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtpa.io\",\"kind\":\"TrustedProfileAnalyzer\",\"version\":\"v1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtpa-operator\",\"version\":\"1.1.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Profile Analyzer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "helm.sdk.operatorframework.io/v1",
                    "repository": "https://github.com/trustification/trusted-profile-analyzer-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:46Z",
                "finalizers": [
                    "operators.coreos.com/csv-cleanup"
                ],
                "generation": 1,
                "labels": {
                    "olm.managed": "true",
                    "operators.coreos.com/rhtpa-operator.tsf-tpa": ""
                },
                "name": "rhtpa-operator.v1.1.3",
                "namespace": "tsf-tpa",
                "resourceVersion": "18440",
                "uid": "cdec01ce-1846-418b-ba79-e44697591515"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "kind": "TrustedProfileAnalyzer",
                            "name": "trustedprofileanalyzers.rhtpa.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Profile Analyzer (RHTPA) 2.2.3 provides a single source of truth for your software inventory across all your environments. You can verify the integrity of your in-house and third-party applications against their respective Software Bill of Materials (SBOM) document.  Trusted Profile Analyzer provides vulnerability, component and license transparency, strengthens your software supply chain security, and enables an accurate, up-to-date understanding of your software inventory.\n\nFeatures and Benefits:\n\nEnhanced Software Supply Chain Security: Offers critical transparency and integrity verification across the entire software lifecycle.\n\nReduced Operational Risk: Proactively identifies and helps remediate vulnerabilities minimizing risk and compliance violations.\n\nImproved Compliance and Auditability: Simplifies the process of meeting regulatory requirements for software transparency and integrity by providing verifiable documentation and continuous monitoring.\n\nFaster Remediation and Incident Response: Provides targeted, actionable insights to prioritize and accelerate the patching and remediation of vulnerabilities.\n\nIncreased Developer Productivity \u0026 Trust: Integrates security into existing workflows without significant overhead, allowing developers to build and deploy with greater confidence in the integrity of their code and components.\n\nCentralized Visibility and Control: Consolidates disparate security information into a single pane of glass, offering a holistic view of your application security posture.\n\nRed Hat Trusted Profile Analyzer is a crucial tool for any organization running applications on OpenShift that needs to confidently understand, verify, and secure the software they deploy, especially in an era of complex software supply chains and increasing regulatory scrutiny.\n\n[Documentation](https://docs.redhat.com/en/documentation/red_hat_trusted_profile_analyzer/2.2).\n",
                "displayName": "Red Hat Trusted Profile Analyzer",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch",
                                            "delete",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtpa.io"
                                        ],
                                        "resources": [
                                            "trustedprofileanalyzers",
                                            "trustedprofileanalyzers/status",
                                            "trustedprofileanalyzers/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "services/finalizers",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtpa-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "rhtpa-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "rhtpa-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "image": "registry.redhat.io/rhtpa/rhtpa-rhel9-operator@sha256:cb5b933220b1493a9fd73380d296b3d6f79c594fc28446e0197c9a3b143025ef",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true
                                            },
                                            "serviceAccountName": "rhtpa-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtpa-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": false,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "rhtpa",
                    "trusted-profile-analyzer"
                ],
                "links": [
                    {
                        "name": "Trusted Profile Analyzer Operator",
                        "url": "https://github.com/trustification/trusted-profile-analyzer-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rhtpa-support@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.29.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/trustification/trusted-profile-analyzer-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtpa/rhtpa-rhel9-operator@sha256:cb5b933220b1493a9fd73380d296b3d6f79c594fc28446e0197c9a3b143025ef",
                        "name": "manager"
                    }
                ],
                "replaces": "rhtpa-operator.v1.1.2",
                "version": "1.1.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:46Z",
                        "lastUpdateTime": "2026-04-03T00:11:46Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:46Z",
                        "lastUpdateTime": "2026-04-03T00:11:46Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:49Z",
                        "lastUpdateTime": "2026-04-03T00:11:49Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:49Z",
                        "lastUpdateTime": "2026-04-03T00:11:49Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:49Z",
                        "lastUpdateTime": "2026-04-03T00:11:49Z",
                        "message": "installing: waiting for deployment rhtpa-operator-controller-manager to become ready: deployment \"rhtpa-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:04Z",
                        "lastUpdateTime": "2026-04-03T00:12:04Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:04Z",
                "lastUpdateTime": "2026-04-03T00:12:04Z",
                "message": "install strategy completed with no errors",
                "phase": "Succeeded",
                "reason": "InstallSucceeded",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.29.0) less than server version (v1.34.5)",
                        "name": "rhtpa-operator.v1.1.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trustedprofileanalyzers.rhtpa.io",
                        "status": "Present",
                        "uuid": "1058de5e-92a8-4ac2-bb93-c0ed2e8433ab",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\",\"delete\",\"patch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"\"],\"resources\":[\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtpa.io\"],\"resources\":[\"trustedprofileanalyzers\",\"trustedprofileanalyzers/status\",\"trustedprofileanalyzers/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"services/finalizers\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtpa-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Challenge\",\n    \"metadata\": {\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"authorizationURL\": \"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/XXXXX\",\n      \"dnsName\": \"sample.dns.name\",\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"key\": \"XXX\",\n      \"solver\": {\n        \"dns01\": {\n          \"route53\": {\n            \"accessKeyID\": \"XXX\",\n            \"hostedZoneID\": \"XXX\",\n            \"region\": \"us-east-1\",\n            \"secretAccessKeySecretRef\": {\n              \"key\": \"awsSecretAccessKey\",\n              \"name\": \"aws-secret\"\n            }\n          }\n        },\n        \"selector\": {\n          \"dnsNames\": [\n            \"sample.dns.name\"\n          ]\n        }\n      },\n      \"token\": \"XXX\",\n      \"type\": \"DNS-01\",\n      \"url\": \"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/XXXXXX/XXXXX\",\n      \"wildcard\": false\n    }\n  },\n  {\n    \"apiVersion\": \"acme.cert-manager.io/v1\",\n    \"kind\": \"Order\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"selfsigned-ca\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"selfsigned-ca.dns.name\",\n      \"isCA\": true,\n      \"issuerRef\": {\n        \"group\": \"cert-manager.io\",\n        \"kind\": \"ClusterIssuer\",\n        \"name\": \"selfsigned-issuer\"\n      },\n      \"privateKey\": {\n        \"algorithm\": \"ECDSA\",\n        \"size\": 256\n      },\n      \"secretName\": \"ca-root-secret\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Certificate\",\n    \"metadata\": {\n      \"name\": \"tls-cert\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"commonName\": \"sample.dns.name\",\n      \"dnsNames\": [\n        \"sample.dns.name\"\n      ],\n      \"isCA\": false,\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"secretName\": \"tls-cert\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"CertificateRequest\",\n    \"metadata\": {\n      \"annotations\": {\n        \"cert-manager.io/certificate-name\": \"tls-cert\",\n        \"cert-manager.io/certificate-revision\": \"1\",\n        \"cert-manager.io/private-key-secret-name\": \"tls-cert-sample\"\n      },\n      \"name\": \"tls-cert-sample\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"groups\": [\n        \"system:serviceaccounts\",\n        \"system:serviceaccounts:cert-manager\",\n        \"system:authenticated\"\n      ],\n      \"issuerRef\": {\n        \"kind\": \"Issuer\",\n        \"name\": \"letsencrypt-staging\"\n      },\n      \"request\": \"XXX\",\n      \"username\": \"system:serviceaccount:cert-manager:cert-manager\"\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"ClusterIssuer\",\n    \"metadata\": {\n      \"name\": \"selfsigned-issuer\"\n    },\n    \"spec\": {\n      \"selfSigned\": {}\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"ca-issuer\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"ca\": {\n        \"secretName\": \"ca-root-secret\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"cert-manager.io/v1\",\n    \"kind\": \"Issuer\",\n    \"metadata\": {\n      \"name\": \"letsencrypt-staging\",\n      \"namespace\": \"default\"\n    },\n    \"spec\": {\n      \"acme\": {\n        \"email\": \"aos-ci-cd@redhat.com\",\n        \"privateKeySecretRef\": {\n          \"name\": \"letsencrypt-staging\"\n        },\n        \"server\": \"https://acme-staging-v02.api.letsencrypt.org/directory\",\n        \"solvers\": [\n          {\n            \"dns01\": {\n              \"route53\": {\n                \"accessKeyID\": \"ACCESS_KEY_ID\",\n                \"hostedZoneID\": \"HOSTED_ZONE_ID\",\n                \"region\": \"AWS_REGION\",\n                \"secretAccessKeySecretRef\": {\n                  \"key\": \"access-key\",\n                  \"name\": \"sample-aws-secret\"\n                }\n              }\n            },\n            \"selector\": {\n              \"dnsNames\": [\n                \"sample.dns.name\"\n              ]\n            }\n          }\n        ]\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"CertManager\",\n    \"metadata\": {\n      \"name\": \"cluster\"\n    },\n    \"spec\": {\n      \"logLevel\": \"Normal\",\n      \"managementState\": \"Managed\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.openshift.io/v1alpha1\",\n    \"kind\": \"IstioCSR\",\n    \"metadata\": {\n      \"annotations\": {\n        \"kubernetes.io/description\": \"Resource behavior is managed through IstioCSR featuregate, which is enabled by default. Please refer to the cert-manager documentation for more information on the istio-csr feature.\"\n      },\n      \"name\": \"default\",\n      \"namespace\": \"istio-csr\"\n    },\n    \"spec\": {\n      \"istioCSRConfig\": {\n        \"certManager\": {\n          \"issuerRef\": {\n            \"group\": \"cert-manager.io\",\n            \"kind\": \"Issuer\",\n            \"name\": \"istio-csr-issuer\"\n          }\n        },\n        \"istio\": {\n          \"namespace\": \"istio-system\"\n        },\n        \"istiodTLSConfig\": {\n          \"trustDomain\": \"cluster.local\"\n        }\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "categories": "Security",
                    "console.openshift.io/disable-operand-delete": "true",
                    "containerImage": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                    "createdAt": "2026-01-27T05:16:46",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "true",
                    "features.operators.openshift.io/token-auth-azure": "true",
                    "features.operators.openshift.io/token-auth-gcp": "true",
                    "olm.operatorGroup": "openshift-cert-manager-operator",
                    "olm.operatorNamespace": "cert-manager-operator",
                    "olm.skipRange": "\u003e=1.18.0 \u003c1.18.1",
                    "operator.openshift.io/uninstall-message": "The cert-manager Operator for Red Hat OpenShift will be removed from cert-manager-operator namespace. If your Operator configured any off-cluster resources, these will continue to run and require manual cleanup. All operands created by the operator will need to be manually cleaned up. Please refer to https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/cert-manager-operator-uninstall.html for additional steps.",
                    "operatorframework.io/cluster-monitoring": "true",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Challenge\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"acme.cert-manager.io\",\"kind\":\"Order\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Certificate\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"CertificateRequest\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"ClusterIssuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"cert-manager.io\",\"kind\":\"Issuer\",\"version\":\"v1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"CertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.openshift.io\",\"kind\":\"IstioCSR\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-cert-manager-operator\",\"version\":\"1.18.1\"}}]}",
                    "operatorframework.io/suggested-namespace": "cert-manager-operator",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Kubernetes Engine\", \"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.25.1",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v3",
                    "repository": "https://github.com/openshift/cert-manager-operator",
                    "support": "Red Hat, Inc."
                },
                "creationTimestamp": "2026-04-03T00:11:40Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "cert-manager-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported",
                    "operatorframework.io/os.linux": "supported"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "tsf",
                "resourceVersion": "17420",
                "uid": "5e443df4-f5ee-4d1c-b5a8-6724f650a602"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "A CertificateRequest is used to request a signed certificate from one of the\nconfigured issuers.\n\nAll fields within the CertificateRequest's `spec` are immutable after creation.\nA CertificateRequest will either succeed or fail, as denoted by its `Ready` status\ncondition and its `status.failureTime` field.\n\nA CertificateRequest is a one-shot resource, meaning it represents a single\npoint in time request for a certificate and cannot be re-used.",
                            "displayName": "CertificateRequest",
                            "kind": "CertificateRequest",
                            "name": "certificaterequests.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A Certificate resource should be created to ensure an up to date and signed\nX.509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`.\n\nThe stored certificate will be renewed before it expires (as configured by `spec.renewBefore`).",
                            "displayName": "Certificate",
                            "kind": "Certificate",
                            "name": "certificates.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "CertManager is the Schema for the certmanagers API",
                            "displayName": "CertManager",
                            "kind": "CertManager",
                            "name": "certmanagers.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Challenge is a type to represent a Challenge request with an ACME server",
                            "displayName": "Challenge",
                            "kind": "Challenge",
                            "name": "challenges.acme.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "A ClusterIssuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is similar to an Issuer, however it is cluster-scoped and therefore can\nbe referenced by resources that exist in *any* namespace, not just the same\nnamespace as the referent.",
                            "displayName": "ClusterIssuer",
                            "kind": "ClusterIssuer",
                            "name": "clusterissuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "An Issuer represents a certificate issuing authority which can be\nreferenced as part of `issuerRef` fields.\nIt is scoped to a single namespace and can therefore only be referenced by\nresources within the same namespace.",
                            "displayName": "Issuer",
                            "kind": "Issuer",
                            "name": "issuers.cert-manager.io",
                            "version": "v1"
                        },
                        {
                            "description": "IstioCSR describes the configuration and information about the managed istio-csr agent.\nThe name must be `default` to make IstioCSR a singleton that is, to allow only one instance of IstioCSR per namespace.\n\nWhen an IstioCSR is created, istio-csr agent is deployed in the IstioCSR-created namespace.",
                            "displayName": "IstioCSR",
                            "kind": "IstioCSR",
                            "name": "istiocsrs.operator.openshift.io",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Order is a type to represent an Order with an ACME server",
                            "displayName": "Order",
                            "kind": "Order",
                            "name": "orders.acme.cert-manager.io",
                            "version": "v1"
                        }
                    ]
                },
                "description": "The cert-manager Operator for Red Hat OpenShift provides seamless support for [cert-manager v1.18.4](https://github.com/cert-manager/cert-manager/tree/v1.18.4), which automates certificate management.\nFor more information, see the [cert-manager Operator for Red Hat OpenShift documentation](https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html).\n",
                "displayName": "cert-manager Operator for Red Hat OpenShift",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "events",
                                            "namespaces",
                                            "pods",
                                            "secrets",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts/token"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "acme.cert-manager.io"
                                        ],
                                        "resources": [
                                            "challenges",
                                            "challenges/finalizers",
                                            "challenges/status",
                                            "orders",
                                            "orders/finalizers",
                                            "orders/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "apiservices"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificaterequests",
                                            "certificaterequests/finalizers",
                                            "certificaterequests/status",
                                            "certificates",
                                            "certificates/finalizers",
                                            "certificates/status",
                                            "clusterissuers",
                                            "clusterissuers/status",
                                            "issuers",
                                            "issuers/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resourceNames": [
                                            "clusterissuers.cert-manager.io/*",
                                            "issuers.cert-manager.io/*"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "approve"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "certificatesigningrequests",
                                            "certificatesigningrequests/status"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "certificates.k8s.io"
                                        ],
                                        "resources": [
                                            "signers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "sign",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers",
                                            "clusteroperators",
                                            "clusteroperators/status",
                                            "infrastructures"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "gateway.networking.k8s.io"
                                        ],
                                        "resources": [
                                            "gateways",
                                            "gateways/finalizers",
                                            "httproutes",
                                            "httproutes/finalizers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/finalizers",
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/finalizers",
                                            "istiocsrs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "certmanagers/status",
                                            "istiocsrs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "istiocsrs"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes",
                                            "routes/custom-host"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "cert-manager-operator",
                                    "app.kubernetes.io/instance": "controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "cert-manager-operator"
                                },
                                "name": "cert-manager-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "cert-manager-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "cert-manager-operator"
                                            },
                                            "labels": {
                                                "name": "cert-manager-operator"
                                            }
                                        },
                                        "spec": {
                                            "affinity": {
                                                "nodeAffinity": {
                                                    "requiredDuringSchedulingIgnoredDuringExecution": {
                                                        "nodeSelectorTerms": [
                                                            {
                                                                "matchExpressions": [
                                                                    {
                                                                        "key": "kubernetes.io/arch",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "amd64",
                                                                            "arm64",
                                                                            "ppc64le",
                                                                            "s390x"
                                                                        ]
                                                                    },
                                                                    {
                                                                        "key": "kubernetes.io/os",
                                                                        "operator": "In",
                                                                        "values": [
                                                                            "linux"
                                                                        ]
                                                                    }
                                                                ]
                                                            }
                                                        ]
                                                    }
                                                }
                                            },
                                            "containers": [
                                                {
                                                    "args": [
                                                        "start",
                                                        "--v=$(OPERATOR_LOG_LEVEL)",
                                                        "--trusted-ca-configmap=$(TRUSTED_CA_CONFIGMAP_NAME)",
                                                        "--cloud-credentials-secret=$(CLOUD_CREDENTIALS_SECRET_NAME)",
                                                        "--unsupported-addon-features=$(UNSUPPORTED_ADDON_FEATURES)"
                                                    ],
                                                    "command": [
                                                        "/usr/bin/cert-manager-operator"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "WATCH_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.annotations['olm.targetNamespaces']"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "cert-manager-operator"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_WEBHOOK",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CA_INJECTOR",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_CONTROLLER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ACMESOLVER",
                                                            "value": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CERT_MANAGER_ISTIOCSR",
                                                            "value": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03"
                                                        },
                                                        {
                                                            "name": "OPERAND_IMAGE_VERSION",
                                                            "value": "1.18.4"
                                                        },
                                                        {
                                                            "name": "ISTIOCSR_OPERAND_IMAGE_VERSION",
                                                            "value": "0.14.2"
                                                        },
                                                        {
                                                            "name": "OPERATOR_IMAGE_VERSION",
                                                            "value": "1.18.1"
                                                        },
                                                        {
                                                            "name": "OPERATOR_LOG_LEVEL",
                                                            "value": "2"
                                                        },
                                                        {
                                                            "name": "TRUSTED_CA_CONFIGMAP_NAME"
                                                        },
                                                        {
                                                            "name": "CLOUD_CREDENTIALS_SECRET_NAME"
                                                        },
                                                        {
                                                            "name": "UNSUPPORTED_ADDON_FEATURES"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/cert-manager/cert-manager-operator-rhel9@sha256:99526f5a179816df1f7f51df0517136b247d815b7bdce0a5d0eb7cdaf4b5ce7a",
                                                    "imagePullPolicy": "IfNotPresent",
                                                    "name": "cert-manager-operator",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "32Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "privileged": false,
                                                        "readOnlyRootFilesystem": true,
                                                        "runAsNonRoot": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    },
                                                    "volumeMounts": [
                                                        {
                                                            "mountPath": "/tmp",
                                                            "name": "tmp"
                                                        }
                                                    ]
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "cert-manager-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10,
                                            "volumes": [
                                                {
                                                    "emptyDir": {},
                                                    "name": "tmp"
                                                }
                                            ]
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "cert-manager-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": true,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": true,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "cert-manager",
                    "cert-manager-operator",
                    "cert",
                    "certificates",
                    "security",
                    "TLS",
                    "istio-csr"
                ],
                "links": [
                    {
                        "name": "Documentation",
                        "url": "https://github.com/openshift/cert-manager-operator/blob/master/README.md"
                    }
                ],
                "maintainers": [
                    {
                        "email": "support@redhat.com",
                        "name": "Red Hat Support"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.27.0",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-webhook"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-ca-injector"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:903ce74138b1ffc735846a7c5fcdf62bbe82ca29568a6b38caec2656f6637671",
                        "name": "cert-manager-controller"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:38899dcd99bcd1c8c8d2c67cd19d5b1756434028ed2f1b926a282723bd63183e",
                        "name": "cert-manager-acmesolver"
                    },
                    {
                        "image": "registry.redhat.io/cert-manager/cert-manager-istio-csr-rhel9@sha256:fb89adfcc4bcdaf21bed27dbc90586fb2b32180259b9f9d6fcf84a38e401fe03",
                        "name": "cert-manager-istiocsr"
                    }
                ],
                "replaces": "cert-manager-operator.v1.18.0",
                "version": "1.18.1"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:39Z",
                        "lastUpdateTime": "2026-04-03T00:11:39Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:43Z",
                        "lastUpdateTime": "2026-04-03T00:11:43Z",
                        "message": "installing: waiting for deployment cert-manager-operator-controller-manager to become ready: deployment \"cert-manager-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:48Z",
                        "lastUpdateTime": "2026-04-03T00:11:48Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:11:48Z",
                "lastUpdateTime": "2026-04-03T00:11:48Z",
                "message": "The operator is running in cert-manager-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.27.0) less than server version (v1.34.5)",
                        "name": "cert-manager-operator.v1.18.1",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificaterequests.cert-manager.io",
                        "status": "Present",
                        "uuid": "d3347d7c-7eaf-4c87-97c7-231f3519d809",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certificates.cert-manager.io",
                        "status": "Present",
                        "uuid": "7b8e5531-03d3-47c9-9ef5-c5bfd12ce50f",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "certmanagers.operator.openshift.io",
                        "status": "Present",
                        "uuid": "1626764f-2825-41f2-ac56-f21c58905b31",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "challenges.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a2ec3534-0f4c-4b9e-ac1d-8ea129b0a9f7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "clusterissuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "b27caddf-ff6e-4d90-8860-a326fb779bca",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "issuers.cert-manager.io",
                        "status": "Present",
                        "uuid": "61759a51-22d6-4dbd-8d6a-1e7a7a9a0047",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "istiocsrs.operator.openshift.io",
                        "status": "Present",
                        "uuid": "835be83c-553b-4146-bedd-1c67ed6cd81a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "orders.acme.cert-manager.io",
                        "status": "Present",
                        "uuid": "a32ef565-24dd-4d07-913b-2ab1c8993c50",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"events\",\"namespaces\",\"pods\",\"secrets\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts/token\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"acme.cert-manager.io\"],\"resources\":[\"challenges\",\"challenges/finalizers\",\"challenges/status\",\"orders\",\"orders/finalizers\",\"orders/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apiregistration.k8s.io\"],\"resources\":[\"apiservices\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificaterequests\",\"certificaterequests/finalizers\",\"certificaterequests/status\",\"certificates\",\"certificates/finalizers\",\"certificates/status\",\"clusterissuers\",\"clusterissuers/status\",\"issuers\",\"issuers/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"approve\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"signers\"],\"resourceNames\":[\"clusterissuers.cert-manager.io/*\",\"issuers.cert-manager.io/*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"certificatesigningrequests\",\"certificatesigningrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"sign\",\"update\",\"watch\"],\"apiGroups\":[\"certificates.k8s.io\"],\"resources\":[\"signers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"certmanagers\",\"clusteroperators\",\"clusteroperators/status\",\"infrastructures\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"gateway.networking.k8s.io\"],\"resources\":[\"gateways\",\"gateways/finalizers\",\"httproutes\",\"httproutes/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\",\"ingresses/finalizers\",\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/finalizers\",\"istiocsrs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"certmanagers/status\",\"istiocsrs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"istiocsrs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\",\"routes/custom-host\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "cert-manager-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"Konflux\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxApplicationAPI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-application-api\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxBuildService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-build-service\"\n    },\n    \"spec\": {\n      \"buildControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"PAC_WEBHOOK_URL\",\n              \"value\": \"http://pipelines-as-code-controller.pipelines-as-code.svc.cluster.local:8180\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"build-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"build-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxCertManager\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-cert-manager\"\n    },\n    \"spec\": {\n      \"createClusterIssuer\": true\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxDefaultTenant\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konfluxdefaulttenant-sample\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxEnterpriseContract\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-enterprise-contract\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxImageController\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-image-controller\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInfo\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-info\"\n    },\n    \"spec\": {\n      \"banner\": {\n        \"items\": [\n          {\n            \"summary\": \"Welcome to Konflux-CI! This is a production environment.\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"17:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"**Scheduled Maintenance**: System maintenance will occur on Friday, March 15th from 2:00 AM to 4:00 AM EST.\",\n            \"timeZone\": \"America/New_York\",\n            \"type\": \"warning\"\n          },\n          {\n            \"dayOfMonth\": 15,\n            \"endTime\": \"18:00\",\n            \"month\": 3,\n            \"startTime\": \"14:00\",\n            \"summary\": \"**CRITICAL**: Security patch deployment in progress. Some services may be temporarily unavailable.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"danger\",\n            \"year\": 2025\n          },\n          {\n            \"dayOfWeek\": 1,\n            \"endTime\": \"11:00\",\n            \"startTime\": \"09:00\",\n            \"summary\": \"Weekly team standup reminder: Every Monday at 10:00 AM.\",\n            \"timeZone\": \"America/Los_Angeles\",\n            \"type\": \"info\"\n          },\n          {\n            \"dayOfMonth\": 31,\n            \"endTime\": \"23:59\",\n            \"month\": 12,\n            \"startTime\": \"00:00\",\n            \"summary\": \"**Annual Review Period**: Performance reviews are due by end of month.\",\n            \"timeZone\": \"UTC\",\n            \"type\": \"warning\"\n          },\n          {\n            \"endTime\": \"20:00\",\n            \"startTime\": \"08:00\",\n            \"summary\": \"**New Feature Available**:\\n\\n- Enhanced build pipeline visualization\\n- Improved security scanning\\n- [View Documentation](https://docs.konflux.example.com)\\n\",\n            \"timeZone\": \"Europe/London\",\n            \"type\": \"info\"\n          }\n        ]\n      },\n      \"publicInfo\": {\n        \"environment\": \"production\",\n        \"integrations\": {\n          \"github\": {\n            \"application_url\": \"https://github.com/apps/my-konflux-app/installations/new\"\n          },\n          \"image_controller\": {\n            \"enabled\": true,\n            \"notifications\": [\n              {\n                \"config\": {\n                  \"url\": \"https://webhook.example.com/build/complete\"\n                },\n                \"event\": \"build_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Build Complete Notification\"\n              },\n              {\n                \"config\": {\n                  \"email\": \"devops-team@example.com\"\n                },\n                \"event\": \"repo_push\",\n                \"method\": \"email\",\n                \"title\": \"Repository Push Notification\"\n              },\n              {\n                \"config\": {\n                  \"timeout\": \"30s\",\n                  \"url\": \"https://webhook.example.com/scan\"\n                },\n                \"event\": \"image_scan_complete\",\n                \"method\": \"webhook\",\n                \"title\": \"Image Scan Complete\"\n              }\n            ]\n          },\n          \"sbom_server\": {\n            \"sbom_sha\": \"https://sbom.example.com/sha\",\n            \"url\": \"https://sbom.example.com/content\"\n          }\n        },\n        \"rbac\": [\n          {\n            \"description\": \"Full access to Konflux resources including secrets and administrative operations\",\n            \"displayName\": \"Administrator\",\n            \"name\": \"konflux-admin-user-actions\"\n          },\n          {\n            \"description\": \"Manage workspace resources without access to sensitive or destructive actions\",\n            \"name\": \"konflux-maintainer-user-actions\"\n          },\n          {\n            \"description\": \"Read-only access to view CI results and workspace information\",\n            \"displayName\": \"Viewer Role\",\n            \"name\": \"konflux-viewer-user-actions\"\n          },\n          {\n            \"description\": \"Custom role for specific use case with limited permissions\",\n            \"name\": \"konflux-custom-role\"\n          }\n        ],\n        \"statusPageUrl\": \"https://status.konflux.example.com\",\n        \"visibility\": \"public\"\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxIntegrationService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-integration-service\"\n    },\n    \"spec\": {\n      \"integrationControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"integration-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"integration-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxInternalRegistry\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-internal-registry\"\n    },\n    \"spec\": null\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxNamespaceLister\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-namespace-lister\"\n    },\n    \"spec\": {\n      \"namespaceLister\": {\n        \"namespaceLister\": {\n          \"env\": [\n            {\n              \"name\": \"LOG_LEVEL\",\n              \"value\": \"0\"\n            },\n            {\n              \"name\": \"CACHE_RESYNC_PERIOD\",\n              \"value\": \"10m\"\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"namespace-lister-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"namespace-lister-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"512m\",\n              \"memory\": \"1Gi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxRBAC\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-rbac\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxReleaseService\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-release-service\"\n    },\n    \"spec\": {\n      \"releaseControllerManager\": {\n        \"manager\": {\n          \"env\": [\n            {\n              \"name\": \"DEFAULT_RELEASE_PVC\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"DEFAULT_RELEASE_PVC\",\n                  \"name\": \"release-service-manager-properties\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_CUSTOM_CONFIG\",\n              \"valueFrom\": {\n                \"configMapKeyRef\": {\n                  \"key\": \"custom-config\",\n                  \"name\": \"release-service-config\"\n                }\n              }\n            },\n            {\n              \"name\": \"EXAMPLE_SECRET_VALUE\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"secret-key\",\n                  \"name\": \"release-service-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"konflux.konflux-ci.dev/v1alpha1\",\n    \"kind\": \"KonfluxUI\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"konflux-operator\"\n      },\n      \"name\": \"konflux-ui\"\n    },\n    \"spec\": {\n      \"dex\": {\n        \"config\": {\n          \"configureLoginWithOpenShift\": true,\n          \"connectors\": [\n            {\n              \"config\": {\n                \"clientID\": \"$GITHUB_CLIENT_ID\",\n                \"clientSecret\": \"$GITHUB_CLIENT_SECRET\",\n                \"orgs\": [\n                  {\n                    \"name\": \"my-org\",\n                    \"teams\": [\n                      \"developers\",\n                      \"admins\"\n                    ]\n                  },\n                  {\n                    \"name\": \"another-org\",\n                    \"teams\": [\n                      \"contributors\"\n                    ]\n                  }\n                ],\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"github\",\n              \"name\": \"GitHub\",\n              \"type\": \"github\"\n            },\n            {\n              \"config\": {\n                \"clientID\": \"$GOOGLE_CLIENT_ID\",\n                \"clientSecret\": \"$GOOGLE_CLIENT_SECRET\",\n                \"groups\": [\n                  \"admin@example.com\"\n                ],\n                \"issuer\": \"https://accounts.google.com\",\n                \"redirectURI\": \"https://dex.example.com/idp/callback\"\n              },\n              \"id\": \"google\",\n              \"name\": \"Google\",\n              \"type\": \"oidc\"\n            },\n            {\n              \"config\": {\n                \"bindDN\": \"cn=admin,dc=example,dc=com\",\n                \"bindPW\": \"$LDAP_BIND_PASSWORD\",\n                \"groupSearch\": {\n                  \"baseDN\": \"ou=Groups,dc=example,dc=com\",\n                  \"filter\": \"(objectClass=groupOfNames)\",\n                  \"nameAttr\": \"cn\",\n                  \"userMatchers\": [\n                    {\n                      \"groupAttr\": \"member\",\n                      \"userAttr\": \"DN\"\n                    }\n                  ]\n                },\n                \"host\": \"ldap.example.com:636\",\n                \"userSearch\": {\n                  \"baseDN\": \"ou=Users,dc=example,dc=com\",\n                  \"emailAttr\": \"mail\",\n                  \"filter\": \"(objectClass=person)\",\n                  \"idAttr\": \"uid\",\n                  \"nameAttr\": \"cn\",\n                  \"username\": \"uid\"\n                }\n              },\n              \"id\": \"ldap\",\n              \"name\": \"LDAP\",\n              \"type\": \"ldap\"\n            }\n          ],\n          \"enablePasswordDB\": true,\n          \"hostname\": \"dex.example.com\",\n          \"passwordConnector\": \"local\",\n          \"port\": \"9443\",\n          \"staticPasswords\": [\n            {\n              \"email\": \"user1@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"7138d2fe-724e-4e86-af8a-db7c4b080e20\",\n              \"username\": \"user1\"\n            },\n            {\n              \"email\": \"user2@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"ea8e8ee1-2283-4e03-83d4-b00f8b821b64\",\n              \"username\": \"user2\"\n            },\n            {\n              \"email\": \"admin@konflux.dev\",\n              \"hash\": \"REDACTED\",\n              \"userID\": \"admin-12345-67890-abcdef\",\n              \"username\": \"admin\"\n            }\n          ]\n        },\n        \"dex\": {\n          \"env\": [\n            {\n              \"name\": \"DEX_LOG_LEVEL\",\n              \"value\": \"debug\"\n            },\n            {\n              \"name\": \"DEX_STORAGE_TYPE\",\n              \"value\": \"kubernetes\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"replicas\": 2\n      },\n      \"ingress\": {\n        \"annotations\": {\n          \"cert-manager.io/cluster-issuer\": \"letsencrypt-prod\",\n          \"nginx.ingress.kubernetes.io/force-ssl-redirect\": \"true\",\n          \"nginx.ingress.kubernetes.io/proxy-body-size\": \"10m\",\n          \"nginx.ingress.kubernetes.io/ssl-redirect\": \"true\"\n        },\n        \"enabled\": true,\n        \"host\": \"konflux-ui.example.com\",\n        \"ingressClassName\": \"nginx\",\n        \"tlsSecretName\": \"konflux-ui-tls\"\n      },\n      \"proxy\": {\n        \"nginx\": {\n          \"env\": [\n            {\n              \"name\": \"NGINX_WORKER_PROCESSES\",\n              \"value\": \"4\"\n            },\n            {\n              \"name\": \"NGINX_WORKER_CONNECTIONS\",\n              \"value\": \"1024\"\n            },\n            {\n              \"name\": \"NGINX_KEEPALIVE_TIMEOUT\",\n              \"value\": \"65\"\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"500m\",\n              \"memory\": \"512Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"100m\",\n              \"memory\": \"256Mi\"\n            }\n          }\n        },\n        \"oauth2Proxy\": {\n          \"env\": [\n            {\n              \"name\": \"OAUTH2_PROXY_PROVIDER\",\n              \"value\": \"oidc\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_OIDC_ISSUER_URL\",\n              \"value\": \"https://dex.example.com/idp/\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_ID\",\n              \"value\": \"oauth2-proxy\"\n            },\n            {\n              \"name\": \"OAUTH2_PROXY_CLIENT_SECRET\",\n              \"valueFrom\": {\n                \"secretKeyRef\": {\n                  \"key\": \"client-secret\",\n                  \"name\": \"oauth2-proxy-secret\"\n                }\n              }\n            }\n          ],\n          \"resources\": {\n            \"limits\": {\n              \"cpu\": \"200m\",\n              \"memory\": \"256Mi\"\n            },\n            \"requests\": {\n              \"cpu\": \"50m\",\n              \"memory\": \"128Mi\"\n            }\n          }\n        },\n        \"replicas\": 3\n      }\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Integration \u0026 Delivery, Security, Developer Tools",
                    "containerImage": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                    "createdAt": "2026-04-02T06:28:07Z",
                    "description": "Cloud native software factory focused on software supply chain security",
                    "olm.operatorGroup": "konflux-operator",
                    "olm.operatorNamespace": "konflux-operator",
                    "olm.suggested-namespace": "konflux-operator",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"Konflux\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxApplicationAPI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxBuildService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxCertManager\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxDefaultTenant\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxEnterpriseContract\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxImageController\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInfo\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxIntegrationService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxInternalRegistry\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxNamespaceLister\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxRBAC\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxReleaseService\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxSegmentBridge\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"konflux.konflux-ci.dev\",\"kind\":\"KonfluxUI\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"konflux-operator\",\"version\":\"0.1.7\"}}]}",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.42.0",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/konflux-ci/konflux-ci",
                    "support": "Konflux Community"
                },
                "creationTimestamp": "2026-04-03T00:11:45Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "konflux-operator",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported"
                },
                "name": "konflux-operator.v0.1.7",
                "namespace": "tsf",
                "resourceVersion": "19344",
                "uid": "889d2052-7fe2-4af4-98e8-5ae77da836a8"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "KonfluxApplicationAPI is the Schema for the konfluxapplicationapis API.",
                            "displayName": "Konflux Application API",
                            "kind": "KonfluxApplicationAPI",
                            "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxBuildService is the Schema for the konfluxbuildservices API",
                            "displayName": "Konflux Build Service",
                            "kind": "KonfluxBuildService",
                            "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxCertManager is the Schema for the konfluxcertmanagers API.",
                            "displayName": "Konflux Cert Manager",
                            "kind": "KonfluxCertManager",
                            "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxDefaultTenant is the Schema for the konfluxdefaulttenants API.",
                            "displayName": "Konflux Default Tenant",
                            "kind": "KonfluxDefaultTenant",
                            "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxEnterpriseContract is the Schema for the konfluxenterprisecontracts API.",
                            "displayName": "Konflux Enterprise Contract",
                            "kind": "KonfluxEnterpriseContract",
                            "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Konflux is the Schema for the konfluxes API.",
                            "displayName": "Konflux",
                            "kind": "Konflux",
                            "name": "konfluxes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxImageController is the Schema for the konfluximagecontrollers API.",
                            "displayName": "Konflux Image Controller",
                            "kind": "KonfluxImageController",
                            "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxInfo",
                            "name": "konfluxinfoes.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxIntegrationService is the Schema for the konfluxintegrationservices API",
                            "displayName": "Konflux Integration Service",
                            "kind": "KonfluxIntegrationService",
                            "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxInternalRegistry is the Schema for the konfluxinternalregistries API.\nEnabling the internal registry requires trust-manager to be deployed for Certificate and Bundle resources.",
                            "displayName": "Konflux Internal Registry",
                            "kind": "KonfluxInternalRegistry",
                            "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxNamespaceLister is the Schema for the konfluxnamespacelisters API.",
                            "displayName": "Konflux Namespace Lister",
                            "kind": "KonfluxNamespaceLister",
                            "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxRBAC is the Schema for the konfluxrbacs API.",
                            "displayName": "Konflux RBAC",
                            "kind": "KonfluxRBAC",
                            "name": "konfluxrbacs.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxReleaseService is the Schema for the konfluxreleaseservices API",
                            "displayName": "Konflux Release Service",
                            "kind": "KonfluxReleaseService",
                            "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "kind": "KonfluxSegmentBridge",
                            "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        },
                        {
                            "description": "KonfluxUI is the Schema for the konfluxuis API",
                            "displayName": "Konflux UI",
                            "kind": "KonfluxUI",
                            "name": "konfluxuis.konflux.konflux-ci.dev",
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "## Welcome to Konflux\n\nKonflux is a **cloud-native software factory** focused on software supply chain security. It provides an enterprise-grade platform for building, testing, and releasing software with built-in security and compliance features.\n\n## Key Features\n\n- **Automated Container Builds**: Build container images from source code using Tekton pipelines with minimal configuration\n- **Integration Testing**: Run comprehensive tests and validations before releasing your software\n- **Managed Releases**: Streamlined release workflows with approval gates and automated promotions\n- **Supply Chain Security**: Built-in SLSA compliance, artifact signing, and attestation generation\n- **Policy Enforcement**: Conforma policies ensure your software meets security and compliance requirements\n- **Web UI**: Intuitive interface for managing applications, viewing pipelines, and monitoring builds\n\n## Installation\n\nAfter installing the Konflux Operator, create a `Konflux` custom resource to deploy the platform.\n\n### Example: Minimal Konflux CR\n\n```yaml\napiVersion: konflux.konflux-ci.dev/v1alpha1\nkind: Konflux\nmetadata:\n  name: konflux\n  namespace: konflux\nspec: {}\n```\n\n## Default Configuration\n\nWhen deployed with an empty spec:\n\n- **Ingress**: Automatically configured using the cluster's default ingress domain\n- **Authentication**: OpenShift OAuth login is enabled by default on OpenShift clusters\n\nFor detailed configuration options, refer to the [documentation](https://konflux-ci.dev/konflux-ci).\n",
                "displayName": "Konflux",
                "icon": [
                    {
                        "base64data": "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",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "groups",
                                            "users"
                                        ],
                                        "verbs": [
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "enterprisecontractpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "appstudio.redhat.com"
                                        ],
                                        "resources": [
                                            "releaseserviceconfigs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "localsubjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "certificates",
                                            "clusterissuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "cert-manager.io"
                                        ],
                                        "resources": [
                                            "issuers"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "clusterversions"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dex.coreos.com"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "*"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis",
                                            "konfluxbuildservices",
                                            "konfluxcertmanagers",
                                            "konfluxdefaulttenants",
                                            "konfluxenterprisecontracts",
                                            "konfluxes",
                                            "konfluximagecontrollers",
                                            "konfluxinfoes",
                                            "konfluxintegrationservices",
                                            "konfluxinternalregistries",
                                            "konfluxnamespacelisters",
                                            "konfluxrbacs",
                                            "konfluxreleaseservices",
                                            "konfluxsegmentbridges",
                                            "konfluxuis"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/finalizers",
                                            "konfluxbuildservices/finalizers",
                                            "konfluxcertmanagers/finalizers",
                                            "konfluxdefaulttenants/finalizers",
                                            "konfluxenterprisecontracts/finalizers",
                                            "konfluxes/finalizers",
                                            "konfluximagecontrollers/finalizers",
                                            "konfluxinfoes/finalizers",
                                            "konfluxintegrationservices/finalizers",
                                            "konfluxinternalregistries/finalizers",
                                            "konfluxnamespacelisters/finalizers",
                                            "konfluxrbacs/finalizers",
                                            "konfluxreleaseservices/finalizers",
                                            "konfluxsegmentbridges/finalizers",
                                            "konfluxuis/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "konflux.konflux-ci.dev"
                                        ],
                                        "resources": [
                                            "konfluxapplicationapis/status",
                                            "konfluxbuildservices/status",
                                            "konfluxcertmanagers/status",
                                            "konfluxdefaulttenants/status",
                                            "konfluxenterprisecontracts/status",
                                            "konfluxes/status",
                                            "konfluximagecontrollers/status",
                                            "konfluxinfoes/status",
                                            "konfluxintegrationservices/status",
                                            "konfluxinternalregistries/status",
                                            "konfluxnamespacelisters/status",
                                            "konfluxrbacs/status",
                                            "konfluxreleaseservices/status",
                                            "konfluxsegmentbridges/status",
                                            "konfluxuis/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "kyverno.io"
                                        ],
                                        "resources": [
                                            "clusterpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "networkpolicies"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-runner-rolebinding",
                                            "build-service-manager-rolebinding",
                                            "build-service-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-manager-rolebinding",
                                            "image-controller-metrics-auth-rolebinding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-manager-rolebinding",
                                            "integration-service-metrics-auth-rolebinding",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-role-binding",
                                            "kyverno-background-controller-konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-application-role-binding",
                                            "release-service-component-role-binding",
                                            "release-service-environment-role-binding",
                                            "release-service-manager-rolebinding",
                                            "release-service-metrics-auth-rolebinding",
                                            "release-service-release-role-binding",
                                            "release-service-releaseplan-role-binding",
                                            "release-service-releaseplanadmission-role-binding",
                                            "release-service-snapshot-role-binding",
                                            "release-service-snapshotenvironmentbinding-role-binding",
                                            "release-service-tekton-role-binding"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterrolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "escalate",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "appstudio-pipelines-runner",
                                            "build-service-manager-role",
                                            "build-service-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "dex",
                                            "konflux-proxy",
                                            "konflux-proxy-namespace-lister"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "enterprisecontract-configmap-viewer-role",
                                            "enterprisecontractpolicy-viewer-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-imagerepository-editor-role",
                                            "image-controller-imagerepository-viewer-role",
                                            "image-controller-manager-role",
                                            "image-controller-metrics-auth-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-integrationtestscenario-admin-role",
                                            "integration-service-integrationtestscenario-editor-role",
                                            "integration-service-integrationtestscenario-viewer-role",
                                            "integration-service-manager-role",
                                            "integration-service-metrics-auth-role",
                                            "integration-service-snapshot-garbage-collector",
                                            "integration-service-tekton-editor-role",
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-integration-runner"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "konflux-maintainer-user-actions"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "namespace-lister-authorizer"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-pipeline-resource-role",
                                            "release-service-application-role",
                                            "release-service-component-role",
                                            "release-service-environment-viewer-role",
                                            "release-service-manager-role",
                                            "release-service-metrics-auth-role",
                                            "release-service-release-editor-role",
                                            "release-service-release-viewer-role",
                                            "release-service-releaseplan-editor-role",
                                            "release-service-releaseplan-viewer-role",
                                            "release-service-releaseplanadmission-editor-role",
                                            "release-service-releaseplanadmission-viewer-role",
                                            "release-service-snapshot-editor-role",
                                            "release-service-snapshot-viewer-role",
                                            "release-service-snapshotenvironmentbinding-editor-role",
                                            "release-service-tekton-role",
                                            "releaseserviceconfig-role"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "segment-bridge"
                                        ],
                                        "resources": [
                                            "clusterroles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-pipeline-config-read-only-binding",
                                            "build-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "public-ec-cm",
                                            "public-ecp"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-rolebinding",
                                            "releaseserviceconfigs-rolebinding"
                                        ],
                                        "resources": [
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "bind"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "build-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "image-controller-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "integration-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resourceNames": [
                                            "release-service-leader-election-role"
                                        ],
                                        "resources": [
                                            "roles"
                                        ],
                                        "verbs": [
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "trust.cert-manager.io"
                                        ],
                                        "resources": [
                                            "bundles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authentication.k8s.io"
                                        ],
                                        "resources": [
                                            "tokenreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "subjectaccessreviews"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "konflux-operator",
                                    "control-plane": "controller-manager"
                                },
                                "name": "konflux-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "app.kubernetes.io/name": "konflux-operator",
                                            "control-plane": "controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "app.kubernetes.io/name": "konflux-operator",
                                                "control-plane": "controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--metrics-bind-address=:8443",
                                                        "--leader-elect",
                                                        "--health-probe-bind-address=:8081"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "image": "quay.io/konflux-ci/konflux-operator:release-sha-b07898f",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8081,
                                                            "name": "probes",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "512Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "100m",
                                                            "memory": "256Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "konflux-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "konflux-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "build",
                    "release",
                    "secure-supply-chain",
                    "pipeline",
                    "scc",
                    "factory"
                ],
                "links": [
                    {
                        "name": "Konflux Operator Repository",
                        "url": "https://github.com/konflux-ci/konflux-ci"
                    },
                    {
                        "name": "Konflux Operator Documentation",
                        "url": "https://konflux-ci.dev/konflux-ci"
                    },
                    {
                        "name": "Report Issues",
                        "url": "https://github.com/konflux-ci/konflux-ci/issues/new"
                    }
                ],
                "maintainers": [
                    {
                        "email": "konflux@googlegroups.com",
                        "name": "Konflux Community"
                    }
                ],
                "maturity": "alpha",
                "minKubeVersion": "1.33.5",
                "provider": {
                    "name": "Konflux Community",
                    "url": "https://konflux-ci.dev/"
                },
                "version": "0.1.7"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:45Z",
                        "lastUpdateTime": "2026-04-03T00:11:45Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:54Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:54Z",
                        "lastUpdateTime": "2026-04-03T00:11:55Z",
                        "message": "installing: waiting for deployment konflux-operator-controller-manager to become ready: deployment \"konflux-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:09Z",
                        "lastUpdateTime": "2026-04-03T00:12:09Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:09Z",
                "lastUpdateTime": "2026-04-03T00:12:09Z",
                "message": "The operator is running in konflux-operator but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.33.5) less than server version (v1.34.5)",
                        "name": "konflux-operator.v0.1.7",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxapplicationapis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e2a2d369-c12f-4ecf-b4af-780bb2b3b025",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxbuildservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "4603cd86-3d23-4459-a3c4-5069e5bf272a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxcertmanagers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "215d59eb-1f77-4527-836b-a13402cc69e7",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxdefaulttenants.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "cdc83889-6aee-4ad7-9307-ad05d246e77a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxenterprisecontracts.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "52d7b7f8-b506-43f1-9437-d7f72f5ec856",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "79de09af-66fe-41b2-8193-a4713a837031",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluximagecontrollers.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea130e4a-f8dc-4b4d-9097-04c110e95d56",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinfoes.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "5c9d9c6a-c473-4e4c-9c8d-459d434d25bf",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxintegrationservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "fd61c669-01a9-4fe0-9ccc-e7582ce7b362",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxinternalregistries.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "e097f12e-16ee-4341-8df4-a9ae430aeba8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxnamespacelisters.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "570dd6f9-cce2-4bab-afe7-7a881055e2a0",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxrbacs.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "10de35ba-14b2-4479-bb74-b071008dd3b9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxreleaseservices.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "1a24c651-25e3-4fe0-b316-c4118d461405",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxsegmentbridges.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "c9a3f97f-8416-47ef-8ee9-b0e509c25452",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "konfluxuis.konflux.konflux-ci.dev",
                        "status": "Present",
                        "uuid": "ea144ca3-c1da-43e4-bbf5-8364f026db77",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"patch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"groups\",\"users\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"enterprisecontractpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"appstudio.redhat.com\"],\"resources\":[\"releaseserviceconfigs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"localsubjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"certificates\",\"clusterissuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"cert-manager.io\"],\"resources\":[\"issuers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"clusterversions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"*\"],\"apiGroups\":[\"dex.coreos.com\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis\",\"konfluxbuildservices\",\"konfluxcertmanagers\",\"konfluxdefaulttenants\",\"konfluxenterprisecontracts\",\"konfluxes\",\"konfluximagecontrollers\",\"konfluxinfoes\",\"konfluxintegrationservices\",\"konfluxinternalregistries\",\"konfluxnamespacelisters\",\"konfluxrbacs\",\"konfluxreleaseservices\",\"konfluxsegmentbridges\",\"konfluxuis\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/finalizers\",\"konfluxbuildservices/finalizers\",\"konfluxcertmanagers/finalizers\",\"konfluxdefaulttenants/finalizers\",\"konfluxenterprisecontracts/finalizers\",\"konfluxes/finalizers\",\"konfluximagecontrollers/finalizers\",\"konfluxinfoes/finalizers\",\"konfluxintegrationservices/finalizers\",\"konfluxinternalregistries/finalizers\",\"konfluxnamespacelisters/finalizers\",\"konfluxrbacs/finalizers\",\"konfluxreleaseservices/finalizers\",\"konfluxsegmentbridges/finalizers\",\"konfluxuis/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"konflux.konflux-ci.dev\"],\"resources\":[\"konfluxapplicationapis/status\",\"konfluxbuildservices/status\",\"konfluxcertmanagers/status\",\"konfluxdefaulttenants/status\",\"konfluxenterprisecontracts/status\",\"konfluxes/status\",\"konfluximagecontrollers/status\",\"konfluxinfoes/status\",\"konfluxintegrationservices/status\",\"konfluxinternalregistries/status\",\"konfluxnamespacelisters/status\",\"konfluxrbacs/status\",\"konfluxreleaseservices/status\",\"konfluxsegmentbridges/status\",\"konfluxuis/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"kyverno.io\"],\"resources\":[\"clusterpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"networkpolicies\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"build-pipeline-runner-rolebinding\",\"build-service-manager-rolebinding\",\"build-service-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"image-controller-manager-rolebinding\",\"image-controller-metrics-auth-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"integration-service-manager-rolebinding\",\"integration-service-metrics-auth-rolebinding\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-role-binding\",\"kyverno-background-controller-konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"release-service-application-role-binding\",\"release-service-component-role-binding\",\"release-service-environment-role-binding\",\"release-service-manager-rolebinding\",\"release-service-metrics-auth-rolebinding\",\"release-service-release-role-binding\",\"release-service-releaseplan-role-binding\",\"release-service-releaseplanadmission-role-binding\",\"release-service-snapshot-role-binding\",\"release-service-snapshotenvironmentbinding-role-binding\",\"release-service-tekton-role-binding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"escalate\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"appstudio-pipelines-runner\",\"build-service-manager-role\",\"build-service-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"dex\",\"konflux-proxy\",\"konflux-proxy-namespace-lister\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"enterprisecontract-configmap-viewer-role\",\"enterprisecontractpolicy-viewer-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"image-controller-imagerepository-editor-role\",\"image-controller-imagerepository-viewer-role\",\"image-controller-manager-role\",\"image-controller-metrics-auth-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"integration-service-integrationtestscenario-admin-role\",\"integration-service-integrationtestscenario-editor-role\",\"integration-service-integrationtestscenario-viewer-role\",\"integration-service-manager-role\",\"integration-service-metrics-auth-role\",\"integration-service-snapshot-garbage-collector\",\"integration-service-tekton-editor-role\",\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-integration-runner\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"konflux-maintainer-user-actions\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"namespace-lister-authorizer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"release-pipeline-resource-role\",\"release-service-application-role\",\"release-service-component-role\",\"release-service-environment-viewer-role\",\"release-service-manager-role\",\"release-service-metrics-auth-role\",\"release-service-release-editor-role\",\"release-service-release-viewer-role\",\"release-service-releaseplan-editor-role\",\"release-service-releaseplan-viewer-role\",\"release-service-releaseplanadmission-editor-role\",\"release-service-releaseplanadmission-viewer-role\",\"release-service-snapshot-editor-role\",\"release-service-snapshot-viewer-role\",\"release-service-snapshotenvironmentbinding-editor-role\",\"release-service-tekton-role\",\"releaseserviceconfig-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\"],\"resourceNames\":[\"segment-bridge\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"build-pipeline-config-read-only-binding\",\"build-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"image-controller-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"integration-service-leader-election-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"public-ec-cm\",\"public-ecp\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\"],\"resourceNames\":[\"release-service-leader-election-rolebinding\",\"releaseserviceconfigs-rolebinding\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"build-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"image-controller-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"integration-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"roles\"],\"resourceNames\":[\"release-service-leader-election-role\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"trust.cert-manager.io\"],\"resources\":[\"bundles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authentication.k8s.io\"],\"resources\":[\"tokenreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"authorization.k8s.io\"],\"resources\":[\"subjectaccessreviews\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "konflux-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"ManualApprovalGate\",\n    \"metadata\": {\n      \"name\": \"manual-approval-gate\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"OpenShiftPipelinesAsCode\",\n    \"metadata\": {\n      \"name\": \"pipelines-as-code\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonAddon\",\n    \"metadata\": {\n      \"name\": \"addon\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonChain\",\n    \"metadata\": {\n      \"name\": \"chain\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonConfig\",\n    \"metadata\": {\n      \"name\": \"config\"\n    },\n    \"spec\": {\n      \"addon\": {\n        \"params\": [\n          {\n            \"name\": \"pipelineTemplates\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverTasks\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"resolverStepActions\",\n            \"value\": \"true\"\n          },\n          {\n            \"name\": \"communityResolverTasks\",\n            \"value\": \"true\"\n          }\n        ]\n      },\n      \"params\": [\n        {\n          \"name\": \"createRbacResource\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"legacyPipelineRbac\",\n          \"value\": \"true\"\n        },\n        {\n          \"name\": \"createCABundleConfigMaps\",\n          \"value\": \"true\"\n        }\n      ],\n      \"profile\": \"all\",\n      \"pruner\": {\n        \"keep\": 100,\n        \"resources\": [\n          \"pipelinerun\",\n          \"taskrun\"\n        ],\n        \"schedule\": \"0 8 * * *\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonHub\",\n    \"metadata\": {\n      \"name\": \"hub\"\n    },\n    \"spec\": {\n      \"api\": {\n        \"catalogRefreshInterval\": \"30m\"\n      },\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonInstallerSet\",\n    \"metadata\": {\n      \"name\": \"foo\"\n    },\n    \"spec\": {\n      \"manifests\": []\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPipeline\",\n    \"metadata\": {\n      \"name\": \"pipeline\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonPruner\",\n    \"metadata\": {\n      \"name\": \"pruner\"\n    },\n    \"spec\": {\n      \"disabled\": true,\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonResult\",\n    \"metadata\": {\n      \"name\": \"result\"\n    },\n    \"spec\": {\n      \"auth_disable\": true,\n      \"db_enable_auto_migration\": true,\n      \"db_host\": \"tekton-results-postgres-service.openshift-pipelines.svc.cluster.local\",\n      \"db_port\": 5432,\n      \"log_level\": \"debug\",\n      \"logging_pvc_name\": \"tekton-logs\",\n      \"logs_api\": true,\n      \"logs_buffer_size\": 32768,\n      \"logs_path\": \"/logs\",\n      \"logs_type\": \"File\",\n      \"prometheus_port\": 9090,\n      \"server_port\": 8080,\n      \"targetNamespace\": \"openshift-pipelines\",\n      \"tls_hostname_override\": \"tekton-results-api-service.openshift-pipelines.svc.cluster.local\"\n    }\n  },\n  {\n    \"apiVersion\": \"operator.tekton.dev/v1alpha1\",\n    \"kind\": \"TektonTrigger\",\n    \"metadata\": {\n      \"name\": \"trigger\"\n    },\n    \"spec\": {\n      \"targetNamespace\": \"openshift-pipelines\"\n    }\n  }\n]",
                    "capabilities": "Full Lifecycle",
                    "categories": "Developer Tools, Integration \u0026 Delivery",
                    "certified": "false",
                    "console.openshift.io/plugins": "[\"pipelines-console-plugin\"]",
                    "description": "Red Hat OpenShift Pipelines is a cloud-native CI/CD solution for building pipelines using Tekton concepts which run natively on OpenShift and Kubernetes.",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "true",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "olm.skipRange": "\u003e=1.19.0 \u003c1.20.3",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"ManualApprovalGate\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"OpenShiftPipelinesAsCode\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonAddon\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonChain\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonConfig\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonHub\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonInstallerSet\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPipeline\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonPruner\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonResult\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"operator.tekton.dev\",\"kind\":\"TektonTrigger\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"openshift-pipelines-operator-rh\",\"version\":\"1.20.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"OpenShift Container Platform\", \"OpenShift Platform Plus\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.37.0",
                    "operators.operatorframework.io/internal-objects": "[\"tektoninstallersets.operator.tekton.dev\", \"tektonconfigs.operator.tekton.dev\",\"tektonpipelines.operator.tekton.dev\",\"tektontriggers.operator.tekton.dev\",\"tektonaddons.operator.tekton.dev\", \"tektonhubs.operator.tekton.dev\", \"tektonresults.operator.tekton.dev\", \"tektonchains.operator.tekton.dev\", \"openshiftpipelinesascodes.operator.tekton.dev\", \"manualapprovalgates.operator.tekton.dev\",\"tektonpruners.operator.tekton.dev\"]",
                    "operators.operatorframework.io/project_layout": "unknown",
                    "repository": "https://github.com/tektoncd/operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:12:10Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true",
                    "operatorframework.io/arch.amd64": "supported",
                    "operatorframework.io/arch.arm64": "supported",
                    "operatorframework.io/arch.ppc64le": "supported",
                    "operatorframework.io/arch.s390x": "supported"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "tsf",
                "resourceVersion": "19889",
                "uid": "553988b8-0fb0-4d7a-bff1-ae39b277af39"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "Represents an installation of latest version of Manual Approval Gate",
                            "displayName": "Manual Approval Gate",
                            "kind": "ManualApprovalGate",
                            "name": "manualapprovalgates.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Manual Approval Gate installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Manual Approval Gate installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of OpenShift Pipelines As Code",
                            "displayName": "OpenShift Pipelines As Code",
                            "kind": "OpenShiftPipelinesAsCode",
                            "name": "openshiftpipelinesascodes.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Pipelines As Code installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Pipelines As Code installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Addons (exclusively Tasks, StepActions, consoleyamlsamples, consoleclidownloads and consolequickstarts)",
                            "displayName": "Tekton Addons",
                            "kind": "TektonAddon",
                            "name": "tektonaddons.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Chains",
                            "displayName": "Tekton Chains",
                            "kind": "TektonChain",
                            "name": "tektonchains.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton components, TektonPipeline, TektonTrigger and TektonAddon",
                            "displayName": "Tekton Configuration",
                            "kind": "TektonConfig",
                            "name": "tektonconfigs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektonpipelines",
                                    "name": "pipeline",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektontriggers",
                                    "name": "trigger",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "tektonaddons",
                                    "name": "addon",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "openshiftpipelinesascodes",
                                    "name": "pipelinesascode",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton components are installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                },
                                {
                                    "description": "Installation Profile (specifies which of the Tekton components are installed)",
                                    "displayName": "Profile",
                                    "path": "profile",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Hub",
                            "displayName": "Tekton Hub",
                            "kind": "TektonHub",
                            "name": "tektonhubs.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "This CustomResourceDefinition (CRD) is used internally by the other OpenShift Pipelines CRDs to maintain the lifecycle of OpenShift Pipelines Components",
                            "displayName": "Tekton Installer Set",
                            "kind": "TektonInstallerSet",
                            "name": "tektoninstallersets.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "clusterroles",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "customresourcedefinitions",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "deployments",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "clusterrolebindings",
                                    "name": "",
                                    "version": "v1beta1"
                                },
                                {
                                    "kind": "services",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "pods",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "configmaps",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "config",
                                    "name": "",
                                    "version": "v1alpha1"
                                },
                                {
                                    "kind": "namespaces",
                                    "name": "",
                                    "version": "v1"
                                },
                                {
                                    "kind": "serviceaccounts",
                                    "name": "",
                                    "version": "v1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "List of OpenShift API resources managed by this InstallerSet",
                                    "displayName": "Manifests",
                                    "path": "manifests",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Operator installed",
                                    "displayName": "ObservedGeneration",
                                    "path": "observedGeneration",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pipelines",
                            "displayName": "Tekton Pipelines",
                            "kind": "TektonPipeline",
                            "name": "tektonpipelines.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pipelines installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pipelines installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Pruner",
                            "displayName": "Tekton Pruner",
                            "kind": "TektonPruner",
                            "name": "tektonpruners.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Pruner installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Pruner installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Results",
                            "displayName": "Tekton Results",
                            "kind": "TektonResult",
                            "name": "tektonresults.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Addons installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Addons installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Represents an installation of latest version of Tekton Triggers",
                            "displayName": "Tekton Triggers",
                            "kind": "TektonTrigger",
                            "name": "tektontriggers.operator.tekton.dev",
                            "resources": [
                                {
                                    "kind": "tektoninstallersets",
                                    "name": "",
                                    "version": "v1alpha1"
                                }
                            ],
                            "specDescriptors": [
                                {
                                    "description": "Namespace where Tekton Triggers installed",
                                    "displayName": "Target Namespace",
                                    "path": "targetNamespace",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "statusDescriptors": [
                                {
                                    "description": "The version of Tekton Triggers installed",
                                    "displayName": "Version",
                                    "path": "version",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:label"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat OpenShift Pipelines is a cloud-native continuous integration and delivery\n(CI/CD) solution for building pipelines using [Tekton](https://tekton.dev).\nTekton is a flexible Kubernetes-native open-source CI/CD framework, which\nenables automating deployments across multiple platforms (Kubernetes,\nserverless, VMs, etc) by abstracting away the underlying details.\n\n## Features\n\n* Standard CI/CD pipelines definition\n* Build images with Kubernetes tools such as S2I, Buildah, Buildpacks, Kaniko, etc\n* Deploy applications to multiple platforms such as Kubernetes, serverless and VMs\n* Easy to extend and integrate with existing tools\n* Scale pipelines on-demand\n* Portable across any Kubernetes platform\n* Designed for microservices and decentralized team\n* Integrated with OpenShift Developer Console\n\n## Installation\n\n_Red Hat OpenShift Pipelines Operator_ gets installed into a single namespace (openshift-operators) which would then install _Red Hat OpenShift Pipelines_ into the openshift-pipelines namespace. _Red Hat OpenShift Pipelines_ is however cluster-wide and can run pipelines created in any namespace.\n\n### Components\n\n- Tekton Pipelines: v1.3.2\n- Tekton Triggers: v0.33.0\n- Pipelines as Code: v0.37.7\n- Tekton Chains: v0.25.1\n- Tekton Hub (tech-preview): v1.22.9\n- Tekton Results (tech-preview): v0.16.0\n- Manual Approval Gate (tech-preview): v0.6.0\n- Tekton Pruner (tech-preview): v0.2.0\n\n## Getting Started\n\nIn order to get familiar with _OpenShift Pipelines_ concepts and create your first pipeline, follow the [OpenShift Pipelines Docs](https://docs.openshift.com/pipelines/1.20/create/creating-applications-with-cicd-pipelines.html).\n\n## CLI (tkn)\n\nTekton Pipelines cli project provides a CLI (tkn) for interacting with OpenShift Pipelines.\n\n[Download tkn](/command-line-tools) (links will be available on `command line tools` page after this operator is installed).\n",
                "displayName": "Red Hat OpenShift Pipelines",
                "icon": [
                    {
                        "base64data": "iVBORw0KGgoAAAANSUhEUgAAAXwAAAF8CAYAAADM5wDKAAAACXBIWXMAAG66AABuugHW3rEXAAAg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\nAElFTkSuQmCC\n",
                        "mediatype": "image/png"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "nodes"
                                        ],
                                        "verbs": [
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "pods",
                                            "services",
                                            "endpoints",
                                            "persistentvolumeclaims",
                                            "events",
                                            "configmaps",
                                            "secrets",
                                            "pods/log",
                                            "limitranges"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions",
                                            "apps"
                                        ],
                                        "resources": [
                                            "ingresses",
                                            "ingresses/status"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "daemonsets",
                                            "replicasets",
                                            "statefulsets",
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterroles",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch",
                                            "bind",
                                            "escalate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "serviceaccounts"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch",
                                            "impersonate"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "rolebindings"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apiextensions.k8s.io"
                                        ],
                                        "resources": [
                                            "customresourcedefinitions",
                                            "customresourcedefinitions/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "create",
                                            "update",
                                            "delete",
                                            "list",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "admissionregistration.k8s.io"
                                        ],
                                        "resources": [
                                            "mutatingwebhookconfigurations",
                                            "validatingwebhookconfigurations"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "build.knative.dev"
                                        ],
                                        "resources": [
                                            "builds",
                                            "buildtemplates",
                                            "clusterbuildtemplates"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "extensions"
                                        ],
                                        "resources": [
                                            "deployments/finalizers"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "tekton.dev",
                                            "triggers.tekton.dev",
                                            "operator.tekton.dev",
                                            "pipelinesascode.tekton.dev"
                                        ],
                                        "resources": [
                                            "*"
                                        ],
                                        "verbs": [
                                            "add",
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "dashboard.tekton.dev"
                                        ],
                                        "resources": [
                                            "*",
                                            "tektonaddons"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "security.openshift.io"
                                        ],
                                        "resources": [
                                            "securitycontextconstraints"
                                        ],
                                        "verbs": [
                                            "use",
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "events.k8s.io"
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "create",
                                            "update",
                                            "delete",
                                            "patch",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleyamlsamples",
                                            "consoleclidownloads",
                                            "consolequickstarts",
                                            "consolelinks"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "autoscaling"
                                        ],
                                        "resources": [
                                            "horizontalpodautoscalers"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "policy"
                                        ],
                                        "resources": [
                                            "poddisruptionbudgets"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "jobs",
                                            "cronjobs"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "deletecollection",
                                            "create",
                                            "patch",
                                            "get",
                                            "list",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "resolution.tekton.dev"
                                        ],
                                        "resources": [
                                            "resolutionrequests",
                                            "resolutionrequests/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleplugins"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "delete",
                                            "update",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "openshift-pipelines-operator"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "openshift-pipelines-operator",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "openshift-pipelines-operator"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "openshift-pipelines-operator",
                                                "name": "openshift-pipelines-operator"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektonconfig,tektonpipeline,tektontrigger,tektonhub,tektonchain,tektonaddon,tektonresult,openshiftpipelinesascode,manualapprovalgate,tektonpruner",
                                                        "-unique-process-name",
                                                        "tekton-operator-lifecycle"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_PROXY",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582"
                                                        },
                                                        {
                                                            "name": "IMAGE_JOB_PRUNER_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "1.20.3"
                                                        },
                                                        {
                                                            "name": "AUTOINSTALL_COMPONENTS",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "AUTOINSTALL_COMPONENTS",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "DEFAULT_TARGET_NAMESPACE",
                                                            "valueFrom": {
                                                                "configMapKeyRef": {
                                                                    "key": "DEFAULT_TARGET_NAMESPACE",
                                                                    "name": "tekton-config-defaults"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_OBSERVABILITY_NAME",
                                                            "value": "tekton-config-observability"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_KN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MVN_SETTINGS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_COPY",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GEN_ENV_FILE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OC",
                                                            "value": "image-registry.openshift-image-registry.svc:5000/openshift/cli:latest"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_REPORT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_GIT_CLONE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE_AND_RUN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_UPLOAD",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_CACHE_FETCH",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587"
                                                        },
                                                        {
                                                            "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_KN",
                                                            "value": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_OPC",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_SKOPEO_RESULTS",
                                                            "value": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_BUILD",
                                                            "value": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_S2I_GENERATE",
                                                            "value": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_LOAD_SCRIPTS",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GENERATE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PREPARE",
                                                            "value": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_TKN_CLI_SERVE",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731"
                                                        },
                                                        {
                                                            "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_POSTGRES",
                                                            "value": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb"
                                                        },
                                                        {
                                                            "name": "IMAGE_HUB_TEKTON_HUB_UI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc"
                                                        },
                                                        {
                                                            "name": "IMAGE_MAG_MANUAL_APPROVAL",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772"
                                                        },
                                                        {
                                                            "name": "IMAGE_PRUNER_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CONTROLLER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WEBHOOK",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61"
                                                        },
                                                        {
                                                            "name": "IMAGE_PAC_PAC_CLI",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_WATCHER",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_API",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe"
                                                        },
                                                        {
                                                            "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c"
                                                        },
                                                        {
                                                            "name": "IMAGE_ADDONS_MAVEN_GOALS",
                                                            "value": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e"
                                                        },
                                                        {
                                                            "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN",
                                                            "value": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-lifecycle",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                },
                                                {
                                                    "args": [
                                                        "-controllers",
                                                        "tektoninstallerset",
                                                        "-unique-process-name",
                                                        "tekton-operator-cluster-operations"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "OPERATOR_NAME",
                                                            "value": "redhat-openshift-pipelines-operator"
                                                        },
                                                        {
                                                            "name": "PROFILING_PORT",
                                                            "value": "9009"
                                                        },
                                                        {
                                                            "name": "VERSION",
                                                            "value": "v0.77.0"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-controller-config-leader-election"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                                                    "imagePullPolicy": "Always",
                                                    "name": "openshift-pipelines-operator-cluster-operations",
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            },
                            {
                                "label": {
                                    "operator.tekton.dev/release": "v0.77.0",
                                    "version": "v0.77.0"
                                },
                                "name": "tekton-operator-webhook",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "name": "tekton-operator-webhook"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "labels": {
                                                "app": "tekton-operator",
                                                "name": "tekton-operator-webhook"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "env": [
                                                        {
                                                            "name": "KUBERNETES_MIN_VERSION",
                                                            "value": "v1.0.0"
                                                        },
                                                        {
                                                            "name": "SYSTEM_NAMESPACE",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.namespace"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "WEBHOOK_POD_NAME",
                                                            "valueFrom": {
                                                                "fieldRef": {
                                                                    "fieldPath": "metadata.name"
                                                                }
                                                            }
                                                        },
                                                        {
                                                            "name": "CONFIG_LOGGING_NAME",
                                                            "value": "config-logging"
                                                        },
                                                        {
                                                            "name": "CONFIG_LEADERELECTION_NAME",
                                                            "value": "tekton-operator-webhook-config-leader-election"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SERVICE_NAME",
                                                            "value": "tekton-operator-webhook"
                                                        },
                                                        {
                                                            "name": "WEBHOOK_SECRET_NAME",
                                                            "value": "tekton-operator-webhook-certs"
                                                        },
                                                        {
                                                            "name": "METRICS_DOMAIN",
                                                            "value": "tekton.dev/operator"
                                                        },
                                                        {
                                                            "name": "PLATFORM",
                                                            "value": "openshift"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                                                    "name": "tekton-operator-webhook",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8443,
                                                            "name": "https-webhook",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "resources": {},
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true,
                                                        "seccompProfile": {
                                                            "type": "RuntimeDefault"
                                                        }
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "openshift-pipelines-operator"
                                        }
                                    }
                                }
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "tektoncd",
                    "openshift",
                    "build",
                    "pipeline"
                ],
                "links": [
                    {
                        "name": "Tekton Pipeline GitHub Repository",
                        "url": "https://github.com/tektoncd/pipeline"
                    },
                    {
                        "name": "Tekton Operator GitHub Repository",
                        "url": "https://github.com/tektoncd/operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "pipelines-extcomm@redhat.com",
                        "name": "Red Hat"
                    }
                ],
                "maturity": "alpha",
                "provider": {
                    "name": "Red Hat"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_LIFECYCLE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-rhel9-operator@sha256:bfc31fce9ce5f1d47a4aa49f70c28aeb57f4014b0d283782bcb3564ab11a0979",
                        "name": "OPENSHIFT_PIPELINES_OPERATOR_CLUSTER_OPERATIONS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel9@sha256:82ba22161e8f0fc959429029d26d9a32f39a701f0db68291626ee1464715f582",
                        "name": "IMAGE_PIPELINES_PROXY"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel9@sha256:4847fc1483c03d570e5dced72df4a479c39e4bdf0dd76666c35c5d4de2acfcb7",
                        "name": "IMAGE_PIPELINES_TEKTON_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel9@sha256:2c4ec0dfd62375ed45d5758798b1069e16a0a6d1986439d23c61591c4dfb9297",
                        "name": "IMAGE_PIPELINES_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel9@sha256:c6e1e725e260dd02e6ae4c9dad5ea8249d0ffd164950d75700db612a7e06ac2c",
                        "name": "IMAGE_PIPELINES_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-events-rhel9@sha256:ada1a963ce2c45d2bba08051c1e0e2db88b200e9d616fab8fde10b698101fc69",
                        "name": "IMAGE_PIPELINES_TEKTON_EVENTS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__ENTRYPOINT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_PIPELINES_ARG__GIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PARAM_GITINITIMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_REPORT"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_GIT_CLONE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel9@sha256:a2cab07ac5750b7d74f07020c221607ee6777dee6a2be6d0deaf89a609b3b6e8",
                        "name": "IMAGE_ADDONS_PREPARE_AND_RUN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_UPLOAD"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cache-rhel9@sha256:b14dec3468690ea3292e1be758ad0b171636a1624d3baf8d41ced1ea91ffc1ab",
                        "name": "IMAGE_ADDONS_CACHE_FETCH"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel9@sha256:ee91c1719f5ec30aa2214ddfe2b2456819ce5cbfbab9bd958b18aa90fb6baf82",
                        "name": "IMAGE_PIPELINES_ARG__WORKINGDIRINIT_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-sidecarlogresults-rhel9@sha256:eeac6c2ff2f2acc2724d7786dd6bc5341cf7dce57b070bce113985810b45e1e5",
                        "name": "IMAGE_PIPELINES_ARG__SIDECARLOGRESULTS_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel9@sha256:259c6aa469fcff9577eae9fee294eb0143010d68528de2f3b2b21cf523432986",
                        "name": "IMAGE_PIPELINES_ARG__NOP_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel9@sha256:a91d7a109855f7ca7d74557adf55cd09155f99715d7408c94e4f90337d7964c7",
                        "name": "IMAGE_PIPELINES_ARG__SHELL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel9@sha256:f4c15a6e518997beafd705de5c0364145de194c7e965f42af234d33c472d3e18",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel9@sha256:6b79a56373664462beee1bae9a2f475ede6b945d35ab65a427f18990c375f29a",
                        "name": "IMAGE_TRIGGERS_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel9@sha256:4dcd0b18dea61968f20d49c4372eec43689eb52e823e1a6293e9b89c6e21e587",
                        "name": "IMAGE_TRIGGERS_TEKTON_TRIGGERS_CORE_INTERCEPTORS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel9@sha256:6247b2814725f2c121fa1e798d142fbb43d071cc84440e59a661bd01f9d9e666",
                        "name": "IMAGE_TRIGGERS_ARG__EL_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_PARAM_KN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-serverless-1/kn-client-kn-rhel8@sha256:0fa6d15d38601f266347cdd098e80bec9893f7e6b06e84efc4a8c50b3ff3c6cc",
                        "name": "IMAGE_ADDONS_KN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-opc-rhel9@sha256:143eead39e74de11ddac3d534dfae9025867391a7635c1222f03d6debb0c4349",
                        "name": "IMAGE_ADDONS_OPC"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_COPY"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/skopeo@sha256:a65a413f8a2864389a09dc750690d97afbcdc5c70821e0f85e99e8adba7954e0",
                        "name": "IMAGE_ADDONS_SKOPEO_RESULTS"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_PARAM_BUILDER_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/buildah@sha256:18453ab0a62154283aaf4c45efd7543d1c8ecca1aebae46dedc7ddc0f410b232",
                        "name": "IMAGE_ADDONS_S2I_BUILD"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_GEN_ENV_FILE"
                    },
                    {
                        "image": "registry.redhat.io/source-to-image/source-to-image-rhel9@sha256:bc10e7d6122ede5cf4f2882c200447683255465a1080e826761e90bfb983506e",
                        "name": "IMAGE_ADDONS_S2I_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MVN_SETTINGS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_LOAD_SCRIPTS"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_MAVEN_GENERATE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/ubi-minimal@sha256:2f06ae0e6d3d9c4f610d32c480338eef474867f435d8d28625f2985e8acde6e8",
                        "name": "IMAGE_ADDONS_PREPARE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_JOB_PRUNER_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_PARAM_TKN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel9@sha256:72b20bc29e4abbb9cbf473b603c71b4880d64b66c1c2b344e1954c7e01af6095",
                        "name": "IMAGE_ADDONS_TKN"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel9@sha256:050fe6fe1298c45a27982e3f4d0afe637ce01d9b394e85b7eb202309ecdd0731",
                        "name": "IMAGE_ADDONS_TKN_CLI_SERVE"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel9@sha256:91c8dc57d84c9d4e491a522ab94ff08c17af2bb18bd0a70900cf228de35b2927",
                        "name": "TEKTON_OPERATOR_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel9@sha256:eb3c1bbbbaec16c0b2e1565b9f2885f6213a1d2f90ca63c7986042a6ed2be1b8",
                        "name": "IMAGE_CHAINS_TEKTON_CHAINS_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB"
                    },
                    {
                        "image": "registry.redhat.io/rhel9/postgresql-13@sha256:36647bd6d50d2e0e9c99ecf190bd515577c7ce9476e49d927c4d4065011e3441",
                        "name": "IMAGE_RESULTS_POSTGRES"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel9@sha256:722ccea0642efe6fb7816caaab963bf71dc4d2acb6f2204a293311d67e911c82",
                        "name": "IMAGE_HUB_TEKTON_HUB_DB_MIGRATION"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel9@sha256:4ff12438daf22c8f6be14abda5d91c45b03a6824e0592775f49072218b3703fb",
                        "name": "IMAGE_HUB_TEKTON_HUB_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel9@sha256:c2d4e0c0ab71b075bb6b441d7385c959c9ce88b6a1e3a573f9665a6ab36b9c8e",
                        "name": "IMAGE_HUB_TEKTON_HUB_UI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-controller-rhel9@sha256:ad5e622fd95e047212568180070e7a56bb730125a2fdae154aa2a3fd10587afc",
                        "name": "IMAGE_MAG_TEKTON_TASKGROUP_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-webhook-rhel9@sha256:e661d7d22f183d09b405303e94caf7ec440c203f0d374a469f6456cc31230772",
                        "name": "IMAGE_MAG_MANUAL_APPROVAL"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pruner-controller-rhel9@sha256:85d5a2cfd3d1bf6e302b1dee186a98d90c37d89015c85df7d1f980ac2f87b447",
                        "name": "IMAGE_PRUNER_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-controller-rhel9@sha256:bfe69478e0994a9229a6d28e48ea8dbd837869b88861a205610de8d1cce41973",
                        "name": "IMAGE_PAC_PAC_CONTROLLER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-webhook-rhel9@sha256:d28ec79f725102e88993e987bafaf1bb406859bab28743aad573825a51df799e",
                        "name": "IMAGE_PAC_PAC_WEBHOOK"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-watcher-rhel9@sha256:95f3cc4e3173845779e8ed825d34fba1ef07cd3d77c7243b30db2a2915cd1b61",
                        "name": "IMAGE_PAC_PAC_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-cli-rhel9@sha256:372c4999817d0c8e5e7404150c3c27a6878254ae394e259e7511f0f759074995",
                        "name": "IMAGE_PAC_PAC_CLI"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel9@sha256:07789f6e6e3c3a5a974c106b43c2e8bc60edb3321def1f0883f3fcd35a238ed0",
                        "name": "IMAGE_RESULTS_WATCHER"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel9@sha256:6aa9ea8c007ed426efe10bf36d943983fb9a3efe29744e059c0bdf79491a4ffe",
                        "name": "IMAGE_RESULTS_API"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-results-retention-policy-agent-rhel9@sha256:6d83c7e0e068178360998c815a3e0c729ca80a349954172aadafad5da5180d0c",
                        "name": "IMAGE_RESULTS_RETENTION_POLICY_AGENT"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_PARAM_MAVEN_IMAGE"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/openjdk-17@sha256:555c8bcd2596637befd1a6da4aa949c5a2640cf66e09c2dfb932afe37e39095e",
                        "name": "IMAGE_ADDONS_MAVEN_GOALS"
                    },
                    {
                        "image": "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel9@sha256:66f2fcc54c1f79cc90ba053c232765c3e88527254b64b4357b3ab64a7b5c4fbf",
                        "name": "IMAGE_PIPELINES_CONSOLE_PLUGIN"
                    }
                ],
                "replaces": "openshift-pipelines-operator-rh.v1.20.2",
                "version": "1.20.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:03Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:11Z",
                        "lastUpdateTime": "2026-04-03T00:12:12Z",
                        "message": "installing: waiting for deployment openshift-pipelines-operator to become ready: deployment \"openshift-pipelines-operator\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:12:17Z",
                "lastUpdateTime": "2026-04-03T00:12:17Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "manualapprovalgates.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "78eece2e-463f-40c2-8f78-811bfbbd6224",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "openshiftpipelinesascodes.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "350bde5d-f6e9-4dff-862e-4ec71c7dad70",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonaddons.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d9fa84a3-168a-46bc-8850-dd6b3773dd39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonchains.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "672de430-42a8-46a7-999f-69da8ac9fbf9",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonconfigs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "5d3880c9-a9b9-4f51-9212-5b0827998a4e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonhubs.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "c83257a7-4d44-450f-b866-a727e73b4695",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektoninstallersets.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "d804720e-88f7-4472-bd4d-b4aeea17ef39",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpipelines.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "47e9b3e8-35bc-4cf3-a96d-67bdad08a333",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonpruners.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "a2a4fffa-3649-4afa-875a-7c24b45ed8b8",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektonresults.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "680c40b7-67f5-42ce-b43f-82f5f5b517cc",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tektontriggers.operator.tekton.dev",
                        "status": "Present",
                        "uuid": "e39dff50-0933-4e1f-bc18-2c61b8d461b0",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"list\"],\"apiGroups\":[\"\"],\"resources\":[\"nodes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"pods\",\"services\",\"endpoints\",\"persistentvolumeclaims\",\"events\",\"configmaps\",\"secrets\",\"pods/log\",\"limitranges\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"extensions\",\"apps\"],\"resources\":[\"ingresses\",\"ingresses/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"daemonsets\",\"replicasets\",\"statefulsets\",\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"delete\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\",\"bind\",\"escalate\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterroles\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\",\"impersonate\"],\"apiGroups\":[\"\"],\"resources\":[\"serviceaccounts\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"rolebindings\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"create\",\"update\",\"delete\",\"list\",\"patch\",\"watch\"],\"apiGroups\":[\"apiextensions.k8s.io\"],\"resources\":[\"customresourcedefinitions\",\"customresourcedefinitions/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"admissionregistration.k8s.io\"],\"resources\":[\"mutatingwebhookconfigurations\",\"validatingwebhookconfigurations\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"build.knative.dev\"],\"resources\":[\"builds\",\"buildtemplates\",\"clusterbuildtemplates\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"extensions\"],\"resources\":[\"deployments/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"operator.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"add\",\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"tekton.dev\",\"triggers.tekton.dev\",\"operator.tekton.dev\",\"pipelinesascode.tekton.dev\"],\"resources\":[\"*\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"dashboard.tekton.dev\"],\"resources\":[\"*\",\"tektonaddons\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"use\",\"get\",\"list\",\"create\",\"update\",\"delete\"],\"apiGroups\":[\"security.openshift.io\"],\"resources\":[\"securitycontextconstraints\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\"],\"apiGroups\":[\"events.k8s.io\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"create\",\"update\",\"delete\",\"patch\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleyamlsamples\",\"consoleclidownloads\",\"consolequickstarts\",\"consolelinks\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"autoscaling\"],\"resources\":[\"horizontalpodautoscalers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"policy\"],\"resources\":[\"poddisruptionbudgets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"deletecollection\",\"create\",\"patch\",\"get\",\"list\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"jobs\",\"cronjobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"resolution.tekton.dev\"],\"resources\":[\"resolutionrequests\",\"resolutionrequests/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\",\"create\",\"delete\",\"update\",\"patch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleplugins\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "openshift-pipelines-operator",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        },
        {
            "apiVersion": "operators.coreos.com/v1alpha1",
            "kind": "ClusterServiceVersion",
            "metadata": {
                "annotations": {
                    "alm-examples": "[\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"CTlog\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"ctlog-sample\"\n    },\n    \"spec\": {}\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Fulcio\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"fulcio-sample\"\n    },\n    \"spec\": {\n      \"certificate\": {\n        \"commonName\": \"fulcio.hostname\",\n        \"organizationEmail\": \"jdoe@redhat.com\",\n        \"organizationName\": \"Red Hat\"\n      },\n      \"config\": {\n        \"OIDCIssuers\": [\n          {\n            \"ClientID\": \"trusted-artifact-signer\",\n            \"Issuer\": \"https://your-oidc-issuer-url\",\n            \"IssuerURL\": \"https://your-oidc-issuer-url\",\n            \"Type\": \"email\"\n          }\n        ]\n      },\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Rekor\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"rekor-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Securesign\",\n    \"metadata\": {\n      \"annotations\": {\n        \"rhtas.redhat.com/metrics\": \"true\"\n      },\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"securesign-sample\"\n    },\n    \"spec\": {\n      \"ctlog\": {\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"fulcio\": {\n        \"certificate\": {\n          \"commonName\": \"fulcio.hostname\",\n          \"organizationEmail\": \"jdoe@redhat.com\",\n          \"organizationName\": \"Red Hat\"\n        },\n        \"config\": {\n          \"OIDCIssuers\": [\n            {\n              \"ClientID\": \"trusted-artifact-signer\",\n              \"Issuer\": \"https://your-oidc-issuer-url\",\n              \"IssuerURL\": \"https://your-oidc-issuer-url\",\n              \"Type\": \"email\"\n            }\n          ]\n        },\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"rekor\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"trillian\": {\n        \"database\": {\n          \"create\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        }\n      },\n      \"tsa\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"monitoring\": {\n          \"enabled\": true\n        },\n        \"ntpMonitoring\": {\n          \"enabled\": true\n        },\n        \"signer\": {\n          \"certificateChain\": {\n            \"intermediateCA\": [\n              {\n                \"commonName\": \"tsa.hostname-intermediate\",\n                \"organizationEmail\": \"jdoe@redhat.com\",\n                \"organizationName\": \"Red Hat\"\n              }\n            ],\n            \"leafCA\": {\n              \"commonName\": \"tsa.hostname-leaf\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            },\n            \"rootCA\": {\n              \"commonName\": \"tsa.hostname-root\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          }\n        }\n      },\n      \"tuf\": {\n        \"externalAccess\": {\n          \"enabled\": true\n        },\n        \"keys\": [\n          {\n            \"name\": \"rekor.pub\"\n          },\n          {\n            \"name\": \"ctfe.pub\"\n          },\n          {\n            \"name\": \"fulcio_v1.crt.pem\"\n          },\n          {\n            \"name\": \"tsa.certchain.pem\"\n          }\n        ],\n        \"pvc\": {\n          \"accessModes\": [\n            \"ReadWriteOnce\"\n          ],\n          \"retain\": true,\n          \"size\": \"100Mi\"\n        },\n        \"rootKeySecretRef\": {\n          \"name\": \"tuf-root-keys\"\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"TimestampAuthority\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/created-by\": \"rhtas-operator\",\n        \"app.kubernetes.io/instance\": \"timestampauthority-sample\",\n        \"app.kubernetes.io/managed-by\": \"kustomize\",\n        \"app.kubernetes.io/name\": \"timestampauthority\",\n        \"app.kubernetes.io/part-of\": \"rhtas-operator\"\n      },\n      \"name\": \"timestampauthority-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"monitoring\": {\n        \"enabled\": true\n      },\n      \"ntpMonitoring\": {\n        \"enabled\": true\n      },\n      \"signer\": {\n        \"certificateChain\": {\n          \"intermediateCA\": [\n            {\n              \"commonName\": \"tsa.hostname-intermediate\",\n              \"organizationEmail\": \"jdoe@redhat.com\",\n              \"organizationName\": \"Red Hat\"\n            }\n          ],\n          \"leafCA\": {\n            \"commonName\": \"tsa.hostname-leaf\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          },\n          \"rootCA\": {\n            \"commonName\": \"tsa.hostname-root\",\n            \"organizationEmail\": \"jdoe@redhat.com\",\n            \"organizationName\": \"Red Hat\"\n          }\n        }\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Trillian\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"trillian-sample\"\n    },\n    \"spec\": {\n      \"database\": {\n        \"create\": true\n      },\n      \"server\": {\n        \"replicas\": 1\n      },\n      \"signer\": {\n        \"replicas\": 1\n      }\n    }\n  },\n  {\n    \"apiVersion\": \"rhtas.redhat.com/v1alpha1\",\n    \"kind\": \"Tuf\",\n    \"metadata\": {\n      \"labels\": {\n        \"app.kubernetes.io/instance\": \"securesign-sample\",\n        \"app.kubernetes.io/name\": \"securesign-sample\",\n        \"app.kubernetes.io/part-of\": \"trusted-artifact-signer\"\n      },\n      \"name\": \"tuf-sample\"\n    },\n    \"spec\": {\n      \"externalAccess\": {\n        \"enabled\": true\n      },\n      \"keys\": [\n        {\n          \"name\": \"rekor.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"rekor-pub-key\"\n          }\n        },\n        {\n          \"name\": \"fulcio_v1.crt.pem\",\n          \"secretRef\": {\n            \"key\": \"cert\",\n            \"name\": \"fulcio-pub-key\"\n          }\n        },\n        {\n          \"name\": \"ctfe.pub\",\n          \"secretRef\": {\n            \"key\": \"public\",\n            \"name\": \"ctlog-pub-key\"\n          }\n        },\n        {\n          \"name\": \"tsa.certchain.pem\",\n          \"secretRef\": {\n            \"key\": \"certificateChain\",\n            \"name\": \"tsa-cert-chain\"\n          }\n        }\n      ],\n      \"pvc\": {\n        \"accessModes\": [\n          \"ReadWriteMany\"\n        ],\n        \"retain\": true,\n        \"size\": \"100Mi\"\n      }\n    }\n  }\n]",
                    "capabilities": "Seamless Upgrades",
                    "containerImage": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                    "createdAt": "2026-03-12T12:36:36Z",
                    "features.operators.openshift.io/cnf": "false",
                    "features.operators.openshift.io/cni": "false",
                    "features.operators.openshift.io/csi": "false",
                    "features.operators.openshift.io/disconnected": "true",
                    "features.operators.openshift.io/fips-compliant": "false",
                    "features.operators.openshift.io/proxy-aware": "true",
                    "features.operators.openshift.io/tls-profiles": "false",
                    "features.operators.openshift.io/token-auth-aws": "false",
                    "features.operators.openshift.io/token-auth-azure": "false",
                    "features.operators.openshift.io/token-auth-gcp": "false",
                    "olm.operatorGroup": "global-operators",
                    "olm.operatorNamespace": "openshift-operators",
                    "operatorframework.io/properties": "{\"properties\":[{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"CTlog\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Fulcio\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Rekor\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Securesign\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"TimestampAuthority\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Trillian\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.gvk\",\"value\":{\"group\":\"rhtas.redhat.com\",\"kind\":\"Tuf\",\"version\":\"v1alpha1\"}},{\"type\":\"olm.package\",\"value\":{\"packageName\":\"rhtas-operator\",\"version\":\"1.3.3\"}}]}",
                    "operators.openshift.io/valid-subscription": "[\"Red Hat Trusted Artifact Signer\"]",
                    "operators.operatorframework.io/builder": "operator-sdk-v1.36.1-ocp",
                    "operators.operatorframework.io/project_layout": "go.kubebuilder.io/v4",
                    "repository": "https://github.com/securesign/secure-sign-operator",
                    "support": "Red Hat"
                },
                "creationTimestamp": "2026-04-03T00:11:57Z",
                "generation": 1,
                "labels": {
                    "olm.copiedFrom": "openshift-operators",
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "tsf",
                "resourceVersion": "29084",
                "uid": "5b070fcb-a121-4e22-976a-efb85a5b1c30"
            },
            "spec": {
                "apiservicedefinitions": {},
                "cleanup": {
                    "enabled": false
                },
                "customresourcedefinitions": {
                    "owned": [
                        {
                            "description": "CTlog is the Schema for the ctlogs API",
                            "displayName": "CTlog",
                            "kind": "CTlog",
                            "name": "ctlogs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Fulcio is the Schema for the fulcios API",
                            "displayName": "Fulcio",
                            "kind": "Fulcio",
                            "name": "fulcios.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Rekor is the Schema for the rekors API",
                            "displayName": "Rekor",
                            "kind": "Rekor",
                            "name": "rekors.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Securesign is the Schema for the securesigns API",
                            "displayName": "Securesign",
                            "kind": "Securesign",
                            "name": "securesigns.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "ctlog.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "ctlog.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "ctlog.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "ctlog.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "ctlog.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "fulcio.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "fulcio.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "fulcio.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "fulcio.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "fulcio.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "rekor.rekorSearchUI.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "rekor.rekorSearchUI.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "rekor.rekorSearchUI.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tsa.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tsa.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tsa.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tsa.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tsa.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "trillian.signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "trillian.signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "trillian.signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "trillian.signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "trillian.signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "tuf.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "tuf.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "tuf.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "tuf.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "tuf.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "TimestampAuthority is the Schema for the timestampauthorities API",
                            "displayName": "Timestamp Authority",
                            "kind": "TimestampAuthority",
                            "name": "timestampauthorities.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Trillian is the Schema for the trillians API",
                            "displayName": "Trillian",
                            "kind": "Trillian",
                            "name": "trillians.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "server.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "server.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "server.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "server.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "server.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                },
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "signer.replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "signer.resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "signer.affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "signer.affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "signer.affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        },
                        {
                            "description": "Tuf is the Schema for the tufs API",
                            "displayName": "Tuf",
                            "kind": "Tuf",
                            "name": "tufs.rhtas.redhat.com",
                            "specDescriptors": [
                                {
                                    "description": "The desired number of member Pods.",
                                    "displayName": "Replicas",
                                    "path": "replicas",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podCount"
                                    ]
                                },
                                {
                                    "description": "Limits describes the minimum/maximum amount of compute resources required/allowed",
                                    "displayName": "Resource Requirements",
                                    "path": "resources",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:resourceRequirements"
                                    ]
                                },
                                {
                                    "description": "Node affinity is a group of node affinity scheduling",
                                    "displayName": "Node Affinity",
                                    "path": "affinity.nodeAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:nodeAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod affinity is a group of inter pod affinity scheduling rules.",
                                    "displayName": "Pod Affinity",
                                    "path": "affinity.podAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAffinity"
                                    ]
                                },
                                {
                                    "description": "Pod anti affinity is a group of inter pod anti affinity scheduling rules.",
                                    "displayName": "Pod Anti Affinity",
                                    "path": "affinity.podAntiAffinity",
                                    "x-descriptors": [
                                        "urn:alm:descriptor:com.tectonic.ui:podAntiAffinity"
                                    ]
                                }
                            ],
                            "version": "v1alpha1"
                        }
                    ]
                },
                "description": "Red Hat Trusted Artifact Signer enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries and documents. Trusted Artifact Signer provides a production ready deployment of the Sigstore project within an enterprise. Enterprises adopting it can meet signing-related criteria for achieving Supply Chain Levels for Software Artifacts (SLSA) compliance and have greater confidence in the security and trustworthiness of their software supply chains.",
                "displayName": "Red Hat Trusted Artifact Signer",
                "icon": [
                    {
                        "base64data": "<?xml version="1.0" encoding="UTF-8"?><svg xmlns="http://www.w3.org/2000/svg" width="38" height="38" viewBox="0 0 38 38"><title>Red Hat Trusted Artifact Signer icon</title>
<desc>Cloud, RHTAS</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:cq="http://www.day.com/jcr/cq/1.0"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-03-01T15:27:47.848Z</xmp:rhcc-effective-on>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-03-01T15:27:47.848Z</xmp:CreateDate>
         <xmp:rhcc-aspect-ratio>square</xmp:rhcc-aspect-ratio>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-12T23:51:52.865Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-derivative-id>DER2bece562-cf06-439f-9cf0-7de36236f9aa</xmp:rhcc-derivative-id>
         <xmp:rhcc-uploaded-by>pmeilleu@redhat.com</xmp:rhcc-uploaded-by>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-trusted-software-supply-chain</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <xmp:brand-subtype>
            <rdf:Bag>
               <rdf:li>Technology icon</rdf:li>
            </rdf:Bag>
         </xmp:brand-subtype>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-05-10T00:33:56.483Z</dc:modified>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Red Hat Trusted Artifact Signer icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud, RHTAS</rdf:li>
            </rdf:Alt>
         </dc:description>
         <cq:lastReplicationAction_scene7>Activate</cq:lastReplicationAction_scene7>
         <cq:lastReplicationAction_publish>Activate</cq:lastReplicationAction_publish>
         <cq:lastReplicated_publish>2024-10-02T19:54:04.202Z</cq:lastReplicated_publish>
         <cq:lastReplicatedBy>workflow-process-service</cq:lastReplicatedBy>
         <cq:lastReplicationAction>Activate</cq:lastReplicationAction>
         <cq:lastReplicatedBy_publish>workflow-process-service</cq:lastReplicatedBy_publish>
         <cq:isDelivered>false</cq:isDelivered>
         <cq:lastReplicated>2024-10-02T19:54:04.202Z</cq:lastReplicated>
         <cq:lastReplicatedBy_scene7>workflow-process-service</cq:lastReplicatedBy_scene7>
         <cq:lastReplicated_scene7>2024-10-02T19:54:04.202Z</cq:lastReplicated_scene7>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                          
<?xpacket end="w"?></metadata>
<g id="uuid-046a7832-6925-4803-9782-f23c4ab2f3ea"><rect x="1" y="1" width="36" height="36" rx="9" ry="9" stroke-width="0"/><path d="m28,2.25c4.27336,0,7.75,3.47664,7.75,7.75v18c0,4.27336-3.47664,7.75-7.75,7.75H10c-4.27336,0-7.75-3.47664-7.75-7.75V10c0-4.27336,3.47664-7.75,7.75-7.75h18m0-1.25H10C5.02944,1,1,5.02943,1,10v18c0,4.97057,4.02944,9,9,9h18c4.97057,0,9-4.02943,9-9V10c0-4.97057-4.02943-9-9-9h0Z" fill="#4d4d4d" stroke-width="0"/></g><g id="uuid-301afa73-9371-4634-802f-c47250fc09c0"><path d="m17,14.375h-.375v-.875c0-1.72314-1.40234-3.125-3.125-3.125s-3.125,1.40186-3.125,3.125v.875h-.375c-.34473,0-.625.27979-.625.625v7c0,.34521.28027.625.625.625h7c.34473,0,.625-.27979.625-.625v-7c0-.34521-.28027-.625-.625-.625Zm-5.375-.875c0-1.03369.84082-1.875,1.875-1.875s1.875.84131,1.875,1.875v.875h-3.75v-.875Zm4.75,7.875h-5.75v-5.75h5.75v5.75Z" fill="#e00" stroke-width="0"/><path d="m29,24.375H9c-.34473,0-.625.27979-.625.625s.28027.625.625.625h20c.34473,0,.625-.27979.625-.625s-.28027-.625-.625-.625Z" fill="#fff" stroke-width="0"/><path d="m20,22.625c.08594,0,.17285-.01758.25391-.0542l3.59033-1.59827c.00049-.00024.00104-.00043.00153-.00067l.01361-.00604c.02795-.01239.04657-.0351.07172-.0509.03986-.0249.08301-.04425.11676-.078l4.39453-4.39502c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-3.95215,3.95312-1.11621-1.11621,5.95312-5.95312c.24316-.24414.24316-.63965,0-.88379-.24414-.24414-.64062-.24414-.88477,0l-6.39453,6.39502c-.02783.02795-.04114.06323-.06262.09467-.02179.03143-.05017.0567-.06628.09283l-1.60547,3.60498c-.10449.23633-.05371.51318.12891.69629.12012.11963.28027.18311.44238.18311Zm1.80652-3.14465l.71375.71375-1.28687.57251.57312-1.28625Z" fill="#fff" stroke-width="0"/></g></svg>",
                        "mediatype": "image/svg+xml"
                    }
                ],
                "install": {
                    "spec": {
                        "clusterPermissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps",
                                            "secrets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resourceNames": [
                                            "trusted-artifact-signer"
                                        ],
                                        "resources": [
                                            "namespaces"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims",
                                            "serviceaccounts",
                                            "services"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "persistentvolumeclaims/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "deployments",
                                            "statefulsets"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "apps"
                                        ],
                                        "resources": [
                                            "replicasets"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "batch"
                                        ],
                                        "resources": [
                                            "cronjobs",
                                            "jobs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "config.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cluster"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "list",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "console.openshift.io"
                                        ],
                                        "resourceNames": [
                                            "cosign",
                                            "createtree",
                                            "ec",
                                            "fetch-tsa-certs",
                                            "gitsign",
                                            "rekor-cli",
                                            "tuftool",
                                            "updatetree"
                                        ],
                                        "resources": [
                                            "consoleclidownloads"
                                        ],
                                        "verbs": [
                                            "delete",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "prometheuses/api"
                                        ],
                                        "verbs": [
                                            "create",
                                            "get",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "monitoring.coreos.com"
                                        ],
                                        "resources": [
                                            "servicemonitors"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "networking.k8s.io"
                                        ],
                                        "resources": [
                                            "ingresses"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "operator.openshift.io"
                                        ],
                                        "resources": [
                                            "consoles"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rbac.authorization.k8s.io"
                                        ],
                                        "resources": [
                                            "clusterrolebindings",
                                            "clusterroles",
                                            "rolebindings",
                                            "roles"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "deletecollection",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs",
                                            "fulcios",
                                            "rekors",
                                            "securesigns",
                                            "timestampauthorities",
                                            "trillians",
                                            "tufs"
                                        ],
                                        "verbs": [
                                            "create",
                                            "delete",
                                            "get",
                                            "list",
                                            "patch",
                                            "update",
                                            "watch"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/finalizers",
                                            "fulcios/finalizers",
                                            "rekors/finalizers",
                                            "securesigns/finalizers",
                                            "timestampauthorities/finalizers",
                                            "trillians/finalizers",
                                            "tufs/finalizers"
                                        ],
                                        "verbs": [
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "rhtas.redhat.com"
                                        ],
                                        "resources": [
                                            "ctlogs/status",
                                            "fulcios/status",
                                            "rekors/status",
                                            "securesigns/status",
                                            "timestampauthorities/status",
                                            "trillians/status",
                                            "tufs/status"
                                        ],
                                        "verbs": [
                                            "get",
                                            "patch",
                                            "update"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "route.openshift.io"
                                        ],
                                        "resources": [
                                            "routes"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ],
                        "deployments": [
                            {
                                "label": {
                                    "app.kubernetes.io/component": "manager",
                                    "app.kubernetes.io/created-by": "rhtas-operator",
                                    "app.kubernetes.io/instance": "operator-controller-manager",
                                    "app.kubernetes.io/managed-by": "kustomize",
                                    "app.kubernetes.io/name": "deployment",
                                    "app.kubernetes.io/part-of": "rhtas-operator",
                                    "control-plane": "operator-controller-manager"
                                },
                                "name": "rhtas-operator-controller-manager",
                                "spec": {
                                    "replicas": 1,
                                    "selector": {
                                        "matchLabels": {
                                            "control-plane": "operator-controller-manager"
                                        }
                                    },
                                    "strategy": {},
                                    "template": {
                                        "metadata": {
                                            "annotations": {
                                                "kubectl.kubernetes.io/default-container": "manager"
                                            },
                                            "labels": {
                                                "control-plane": "operator-controller-manager"
                                            }
                                        },
                                        "spec": {
                                            "containers": [
                                                {
                                                    "args": [
                                                        "--leader-elect",
                                                        "--metrics-bind-address=0.0.0.0:8080"
                                                    ],
                                                    "command": [
                                                        "/manager"
                                                    ],
                                                    "env": [
                                                        {
                                                            "name": "OPENSHIFT",
                                                            "value": "true"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SIGNER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_LOG_SERVER",
                                                            "value": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_DB",
                                                            "value": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TRILLIAN_NETCAT",
                                                            "value": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CREATETREE",
                                                            "value": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_FULCIO_SERVER",
                                                            "value": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_MONITOR",
                                                            "value": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_REDIS",
                                                            "value": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SERVER",
                                                            "value": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_REKOR_SEARCH_UI",
                                                            "value": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_BACKFILL_REDIS",
                                                            "value": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TUF",
                                                            "value": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CTLOG",
                                                            "value": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_HTTP_SERVER",
                                                            "value": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_SEGMENT_REPORTING",
                                                            "value": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_TIMESTAMP_AUTHORITY",
                                                            "value": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98"
                                                        },
                                                        {
                                                            "name": "RELATED_IMAGE_CLIENT_SERVER",
                                                            "value": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97"
                                                        }
                                                    ],
                                                    "image": "registry.redhat.io/rhtas/rhtas-rhel9-operator@sha256:ca0b90cf1007ac112b7ded7556e503d551c79e2d753ad6e99d38f8e4f4405126",
                                                    "livenessProbe": {
                                                        "httpGet": {
                                                            "path": "/healthz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 15,
                                                        "periodSeconds": 20
                                                    },
                                                    "name": "manager",
                                                    "ports": [
                                                        {
                                                            "containerPort": 8080,
                                                            "name": "metrics",
                                                            "protocol": "TCP"
                                                        }
                                                    ],
                                                    "readinessProbe": {
                                                        "httpGet": {
                                                            "path": "/readyz",
                                                            "port": 8081
                                                        },
                                                        "initialDelaySeconds": 5,
                                                        "periodSeconds": 10
                                                    },
                                                    "resources": {
                                                        "limits": {
                                                            "cpu": "500m",
                                                            "memory": "256Mi"
                                                        },
                                                        "requests": {
                                                            "cpu": "10m",
                                                            "memory": "64Mi"
                                                        }
                                                    },
                                                    "securityContext": {
                                                        "allowPrivilegeEscalation": false,
                                                        "capabilities": {
                                                            "drop": [
                                                                "ALL"
                                                            ]
                                                        },
                                                        "readOnlyRootFilesystem": true
                                                    }
                                                }
                                            ],
                                            "securityContext": {
                                                "runAsNonRoot": true,
                                                "seccompProfile": {
                                                    "type": "RuntimeDefault"
                                                }
                                            },
                                            "serviceAccountName": "rhtas-operator-controller-manager",
                                            "terminationGracePeriodSeconds": 10
                                        }
                                    }
                                }
                            }
                        ],
                        "permissions": [
                            {
                                "rules": [
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "configmaps"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            "coordination.k8s.io"
                                        ],
                                        "resources": [
                                            "leases"
                                        ],
                                        "verbs": [
                                            "get",
                                            "list",
                                            "watch",
                                            "create",
                                            "update",
                                            "patch",
                                            "delete"
                                        ]
                                    },
                                    {
                                        "apiGroups": [
                                            ""
                                        ],
                                        "resources": [
                                            "events"
                                        ],
                                        "verbs": [
                                            "create",
                                            "patch"
                                        ]
                                    }
                                ],
                                "serviceAccountName": "rhtas-operator-controller-manager"
                            }
                        ]
                    },
                    "strategy": "deployment"
                },
                "installModes": [
                    {
                        "supported": false,
                        "type": "OwnNamespace"
                    },
                    {
                        "supported": false,
                        "type": "SingleNamespace"
                    },
                    {
                        "supported": false,
                        "type": "MultiNamespace"
                    },
                    {
                        "supported": true,
                        "type": "AllNamespaces"
                    }
                ],
                "keywords": [
                    "security",
                    "rhtas",
                    "trust"
                ],
                "links": [
                    {
                        "name": "RHTAS Operator",
                        "url": "https://github.com/securesign/secure-sign-operator"
                    }
                ],
                "maintainers": [
                    {
                        "email": "rcook@redhat.com",
                        "name": "Ryan Cook"
                    },
                    {
                        "email": "tturek@redhat.com",
                        "name": "Tomas Turek"
                    },
                    {
                        "email": "jbouska@redhat.com",
                        "name": "Jan Bouska"
                    },
                    {
                        "email": "gpereira@redhat.com",
                        "name": "Gregory Pereira"
                    },
                    {
                        "email": "japower@redhat.com",
                        "name": "Jason Power"
                    },
                    {
                        "email": "somalley@redhat.com",
                        "name": "Sally O'Malley"
                    },
                    {
                        "email": "tdalton@redhat.com",
                        "name": "Tommy Dalton"
                    },
                    {
                        "email": "lball@redhat.com",
                        "name": "Lance Ball"
                    }
                ],
                "maturity": "stable",
                "minKubeVersion": "1.26.0",
                "provider": {
                    "name": "Red Hat",
                    "url": "https://github.com/securesign/secure-sign-operator"
                },
                "relatedImages": [
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logsigner-rhel9@sha256:8ef614441b76914f5727f5bec23a9d8dc2785ca7fd6a2516f393529b7801da53",
                        "name": "trillian-log-signer"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-logserver-rhel9@sha256:f02c58838bf882d9b5d82a1a96e8ab29ce6033ae1b64418118fba43eb9151b41",
                        "name": "trillian-log-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-database-rhel9@sha256:6ca4eb17da6277b142a3353b675d735c106868f827243eaef70cd1ec01d36307",
                        "name": "trillian-db"
                    },
                    {
                        "image": "registry.redhat.io/openshift4/ose-tools-rhel9@sha256:0d70224d12e358b1a107a86e0a7e0845e1e8a4d30ce3a1423600f044e3fb28d2",
                        "name": "trillian-netcat"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/createtree-rhel9@sha256:ee6cce99f4362f9a1b4c60136705a97b3cd9806322208dfcd166241c1a0392ff",
                        "name": "createtree"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/fulcio-rhel9@sha256:d71caff0f67fe8d9665d39193d955fc9352224f647406a40e56428dd6cd24953",
                        "name": "fulcio-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-monitor-rhel9@sha256:bbfa648e6ee7af90308d058926b6962e612f2e6917b7edf16c78ad6048e7d99e",
                        "name": "rekor-monitor"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/trillian-redis-rhel9@sha256:cc686a64f9ae83adecc7a0ffe8a6b82f0750dc39ad05654a8087cf780a1c3b3a",
                        "name": "rekor-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-server-rhel9@sha256:5ffaf92fc557cb891a546ae2682d4e0259166ad6d935970dc958d255abc29a48",
                        "name": "rekor-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-search-ui-rhel9@sha256:865dd51e80034018400794d07edc0b546c6e4de7e2351dddc7f1f6378e1ffdd0",
                        "name": "rekor-search-ui"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/rekor-backfill-redis-rhel9@sha256:8d201eb6b1399f0373fb8456683bb2976dc6644745b7f285af3eb83ca3a0d0a7",
                        "name": "backfill-redis"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/tuffer-rhel9@sha256:f30c3610c1c840ea8edb99c2679edb09768c45012979da1389605c6a54204292",
                        "name": "tuf"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/certificate-transparency-rhel9@sha256:61aeb8693f27b60dd35e3dd1961d14bd95988cae70d649b340045619e5de7acf",
                        "name": "ctlog"
                    },
                    {
                        "image": "registry.redhat.io/ubi9/httpd-24@sha256:e0697f36760789183fefc807dafa3bfeb4098725f923eb9a8f034725a01fbf9f",
                        "name": "http-server"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/segment-reporting-rhel9@sha256:233eb69e52ecb10c54a497e72767b4a2734a1b58341d87971948f2685ebccd29",
                        "name": "segment-reporting"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/timestamp-authority-rhel9@sha256:1ff8c1082274d8ae809e67d5c24e8c4365f2f4e0ce0dea6a2a95c1fac89f2d98",
                        "name": "timestamp-authority"
                    },
                    {
                        "image": "registry.redhat.io/rhtas/client-server-rhel9@sha256:373050d2ded02b5acd0e5edf3ef9819fe65403b2f40b557e9077e4a57629cb97",
                        "name": "client-server"
                    }
                ],
                "replaces": "rhtas-operator.v1.3.2",
                "version": "1.3.3"
            },
            "status": {
                "cleanup": {},
                "conditions": [
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "requirements not yet checked",
                        "phase": "Pending",
                        "reason": "RequirementsUnknown"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:11:56Z",
                        "lastUpdateTime": "2026-04-03T00:11:56Z",
                        "message": "one or more requirements couldn't be found",
                        "phase": "Pending",
                        "reason": "RequirementsNotMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:02Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:02Z",
                        "lastUpdateTime": "2026-04-03T00:12:03Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:12:17Z",
                        "lastUpdateTime": "2026-04-03T00:12:17Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:10Z",
                        "lastUpdateTime": "2026-04-03T00:21:10Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Failed",
                        "reason": "ComponentUnhealthy"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Pending",
                        "reason": "NeedsReinstall"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "all requirements found, attempting install",
                        "phase": "InstallReady",
                        "reason": "AllRequirementsMet"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:11Z",
                        "message": "waiting for install components to report healthy",
                        "phase": "Installing",
                        "reason": "InstallSucceeded"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:11Z",
                        "lastUpdateTime": "2026-04-03T00:21:12Z",
                        "message": "installing: waiting for deployment rhtas-operator-controller-manager to become ready: deployment \"rhtas-operator-controller-manager\" not available: Deployment does not have minimum availability.",
                        "phase": "Installing",
                        "reason": "InstallWaiting"
                    },
                    {
                        "lastTransitionTime": "2026-04-03T00:21:22Z",
                        "lastUpdateTime": "2026-04-03T00:21:22Z",
                        "message": "install strategy completed with no errors",
                        "phase": "Succeeded",
                        "reason": "InstallSucceeded"
                    }
                ],
                "lastTransitionTime": "2026-04-03T00:21:22Z",
                "lastUpdateTime": "2026-04-03T00:21:22Z",
                "message": "The operator is running in openshift-operators but is managing this namespace",
                "phase": "Succeeded",
                "reason": "Copied",
                "requirementStatus": [
                    {
                        "group": "operators.coreos.com",
                        "kind": "ClusterServiceVersion",
                        "message": "CSV minKubeVersion (1.26.0) less than server version (v1.34.5)",
                        "name": "rhtas-operator.v1.3.3",
                        "status": "Present",
                        "version": "v1alpha1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "ctlogs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "f9871ad7-9b9a-4a46-a5ed-28e1da51199a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "fulcios.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "b3cd2add-64b1-4e64-a3e8-b4dcfc68b584",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "rekors.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "4d93594e-c83c-4a78-8d93-fe0f8f4cdd2e",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "securesigns.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "9102ee1d-dbfd-48ad-82ce-162bd1354723",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "timestampauthorities.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "caf8d044-d763-46c2-b94b-c20f6476e77d",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "trillians.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "8972dd65-d0b2-49d5-a1c9-2b943f96714a",
                        "version": "v1"
                    },
                    {
                        "group": "apiextensions.k8s.io",
                        "kind": "CustomResourceDefinition",
                        "message": "CRD is present and Established condition is true",
                        "name": "tufs.rhtas.redhat.com",
                        "status": "Present",
                        "uuid": "717eba57-ac75-4a4a-888b-463c0002f217",
                        "version": "v1"
                    },
                    {
                        "dependents": [
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"configmaps\",\"secrets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"events\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"namespaces\"],\"resourceNames\":[\"trusted-artifact-signer\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims\",\"serviceaccounts\",\"services\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"\"],\"resources\":[\"persistentvolumeclaims/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"deployments\",\"statefulsets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"apps\"],\"resources\":[\"replicasets\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"batch\"],\"resources\":[\"cronjobs\",\"jobs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\",\"watch\"],\"apiGroups\":[\"config.openshift.io\"],\"resources\":[\"ingresses\"],\"resourceNames\":[\"cluster\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"list\",\"watch\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"delete\",\"patch\",\"update\"],\"apiGroups\":[\"console.openshift.io\"],\"resources\":[\"consoleclidownloads\"],\"resourceNames\":[\"cosign\",\"createtree\",\"ec\",\"fetch-tsa-certs\",\"gitsign\",\"rekor-cli\",\"tuftool\",\"updatetree\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"coordination.k8s.io\"],\"resources\":[\"leases\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"get\",\"update\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"prometheuses/api\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"monitoring.coreos.com\"],\"resources\":[\"servicemonitors\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"networking.k8s.io\"],\"resources\":[\"ingresses\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"operator.openshift.io\"],\"resources\":[\"consoles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"deletecollection\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rbac.authorization.k8s.io\"],\"resources\":[\"clusterrolebindings\",\"clusterroles\",\"rolebindings\",\"roles\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"create\",\"delete\",\"get\",\"list\",\"patch\",\"update\",\"watch\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs\",\"fulcios\",\"rekors\",\"securesigns\",\"timestampauthorities\",\"trillians\",\"tufs\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/finalizers\",\"fulcios/finalizers\",\"rekors/finalizers\",\"securesigns/finalizers\",\"timestampauthorities/finalizers\",\"trillians/finalizers\",\"tufs/finalizers\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"patch\",\"update\"],\"apiGroups\":[\"rhtas.redhat.com\"],\"resources\":[\"ctlogs/status\",\"fulcios/status\",\"rekors/status\",\"securesigns/status\",\"timestampauthorities/status\",\"trillians/status\",\"tufs/status\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            },
                            {
                                "group": "rbac.authorization.k8s.io",
                                "kind": "PolicyRule",
                                "message": "cluster rule:{\"verbs\":[\"get\",\"list\"],\"apiGroups\":[\"route.openshift.io\"],\"resources\":[\"routes\"]}",
                                "status": "Satisfied",
                                "version": "v1"
                            }
                        ],
                        "group": "",
                        "kind": "ServiceAccount",
                        "message": "",
                        "name": "rhtas-operator-controller-manager",
                        "status": "Present",
                        "version": "v1"
                    }
                ]
            }
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
